Contact Us

SafeNet KeySecure: Centralized Cryptographic Key Management

SafeNet KeySecure - Key Management Icon

SafeNet KeySecure from Gemalto is the industry’s leading centralized key management platform, and is available as a hardware appliance or hardened virtual security appliance. By utilizing SafeNet KeySecure, organizations benefit from its flexible options for secure and centralized key management – deployed in physical, virtualized infrastructure, and public cloud environments.

Only Gemalto can deliver key management appliances across FIPS-validated hardware or a virtual appliance with a hardware root of trust using SafeNet Hardware Security Modules or Amazon Cloud HSM service.

KeySecure with Crypto Pack Use Cases Diagram

 

Working with the banking and financial services industries, our clients’ and their customers’ information requires the highest levels of security. SafeNet KeySecure encrypts our high-value data and manages the encryption keys, ensuring security and enabling compliance.
Cassio Goldschmidt
Principal Information Security Leader at Digital Insight

Example Use Cases

With SafeNet KeySecure, your organization can lower costs and scale key management that is quickly deployed for high-availability across physical, virtualized infrastructure, and service provider environments. Here are a few ways that SafeNet KeySecure is combined with our portfolio of encryptors to pair reliable encryption at the appropriate level and best-in-class key management.

SafeNet KeySecure + SafeNet ProtectApp encryptor

  • Centralizes administration of application encryption policy and keys
  • Protects sensitive applications in a multi-vendor infrastructure in the data center and the cloud
  • Ensures integrity and authenticity of data through digital signing and verification
  • Only authorized users can access application data
 
Learn more about SafeNet ProtectApp  

SafeNet KeySecure + SafeNet ProtectDB encryptor

  • Application-transparent, column-level database encryption across multi-vendor database management systems in the datacenter and in the cloud
  • Centralized policy control of data access with granular restriction options and regular key rotation
  • Segregate data within a database and meet compliance mandates
 
Learn more about SafeNet ProtectDB

SafeNet KeySecure + SafeNet ProtectFile encryptor

  • Centralized key and policy management to meet compliance mandates
  • Performs transparent encryption of server data at rest without disruption to business operations or application performance
  • Granular access controls so unauthorized users and processes cannot access the encrypted data
  • Can be deployed on network shares, file servers, web servers, application servers, database servers, or other machines running Linux compatible software
 
Learn more about SafeNet ProtectFile  

SafeNet KeySecure + SafeNet Tokenization encryptor

  • Tokenization replaces sensitive data (credit cards, social security numbers, etc.) with a surrogate value - a token. The sensitive data is encrypted and stored in a safe repository while the token is processed throughout the organization
  • Single, centralized interface for logging, auditing, and reporting access to protected data, keys, and tokens
  • Systems with tokens are taken out of the scope of compliance audits, such as PCI DSS
  • Format-preserving, transparent data protection for a wide variety of data types
 
Learn more about SafeNet Tokenization  

SafeNet KeySecure + SafeNet ProtectV encryptor

  • Complete encryption of virtual machine instances and storage volumes. No unencrypted data is written to disk
  • Support AWS Marketplace and VMware environments
  • Pre-boot authentication ensures only authorized users can access information
  • Granular access controls so unauthorized users and processes cannot access the encrypted data, meeting compliance mandates
 
Learn more about SafeNet ProtectV  

Partnering with Industry Leaders

SafeNet KeySecure supports a broad ecosystem of respected interoperability partners using the OASIS KMIP standard, including:

Key Management Partner - AWSKey Management Partner - DellKey Management Partner - GoogleKey Management Partner - IBMKey Management Partner - NetApp  
 
See the full list of our interoperability partners.  
 
Request More Info

SafeNet KeySecure Specifications

Jump to:

 

Hardware Specifications:

Product

 

k460

k450

k250

 

Height

1.7 in

1.7 in

1.7 in

Width

17.1 in without rack mounting brackets, 18.9 in with brackets

17.1 in without rack mounting brackets, 18.9 in with brackets

17.1 in without rack mounting brackets, 18.9 in with brackets

Depth

27.4 in – includes handles and locking bezel

27.4 in – includes handles and locking bezel

10.6 in

Weight

42.5 lbs

42.5 lbs

11.0 lbs

Processor

Intel Xeon E5-2420 1.9 GHz, 15M cache

Intel Xeon E5-2420 1.9 GHz, 15M cache

Intel Atom D525

Serial Port

Standard RS232 male DB9, pin out Standard RS232 male DB9, pin out Standard RS232 male DB9, pin out

Network Interfaces (Back Panel)

2 x 10/100/1000 Mbps Ethernet ports

2 x 10/100/1000 Mbps Ethernet ports

2 x 10/100/1000 Mbps Ethernet ports

PED Port (Back Panel)

The PED port is used to connect the PIN entry device (PED) to the SafeNet KeySecure. N/A N/A

Hard Drive

Two (2) x 500 GB 7.2K RPM SATA 2.5”

Two (2) x 500 GB 7.2K RPM SATA 2.5”

One (1) x 1 TB 7.2K RPM SATA 3.5"

Power Supply (Back Panel)

Two (2) x 350 2W Redundant

Two (2) x 350 2W Redundant

60W

USB Ports

3

3

2

Input Power Ranger

100-240 VAC (4.8 A - 2.4 A)

100-240 VAC (4.8 A - 2.4 A)

100-240 VAC (0.69 A - 0.29 A)

Operating Ambient Temperature

50 to 95 °F / 10 to 35 °C

0 to 40 °F / 32 to 104 °C

4 to 167 °F / -20 to 75 °C



Supported Technologies:

Feature

Details

   

API Support

KMIP 1.1, PKCS #11, JCE, MS-CAPI, ICAPI, and.NET

Network Management

SNMP v1, v2c, and v3 SNMP (v1, v2, and v3), NTP, URL health check, signed secure logs & syslog, automatic log rotation, secured encryption and integrity checked backups and upgrades, extensive statistics

Authentication

LDAP and Active Directory

Management Interfaces

SafeNet KeySecure Management Console: Graphical user interface (GUI) available via web browser that is capable of high-grade 128-bit encryption. JavaScript must be enabled to access all functionality available through the management console.

Command Line Interface (CLI): Command line interface (CLI) available over SSH or directly through the serial console port

Auditing and Logging

Cryptographically signed tracking of granular events. Configurable audit trail with local and remote (syslog) logging.

Supported Algorithms

SafeNet KeySecure supports the following public algorithms:

  • AES
  • ARIA
  • DES
  • DESede
  • HMAC-SHA1
  • HMAC-SHA256
  • HMAC-SHA384
  • HMAC-SHA512
  • RC4
  • RSA
  • SEED

Operating System

Highly customized, hardened OS



SafeNet KeySecure Model Comparison:

Product

k460

k450

k250

Max keys

1,000,000

1,000,000

25,000

Max concurrent clients

1,000

1,000

100

Redundant hot-swap HDs & Power

Yes

Yes

No

FIPS Certification

L3 (includes Luna HSM K6 PCI Card)

L1 (includes SSCL library)

L1 (includes SSCL library)

HSM Management*

Yes Yes Yes

SafeNet Crypto Pack**

Optional

Optional

Optional

SafeNet ProtectV Integration

Yes Yes Yes

SafeNet ProtectApp Integration

Yes

Yes

Yes

SafeNet ProtectFile Integration

Yes

Yes

Yes

SafeNet StorageSecure Integration

Yes

No

No

SafeNet Third-Party Integration Support

 

 

Partner Integration Support
(requires ProtectApp)

 

 

*SafeNet KeySecure will integrate with both SafeNet Network HSM and Amazon CloudHSM
**Remote encryption within SafeNet KeySecure 8.0 appliance using the connectors (SafeNet ProtectApp, ProtectDB and Tokenization) requires the purchase of Crypto Pack. Local encryption and SafeNet ProtectFile do NOT require Crypto Pack feature activation.



Request More Info

Highlighted Key Management Features:

KeySecure Cloud Key Management
  • Heterogeneous Key Management: Manages keys for a variety of encryption products including databases, file servers, tokenization and applications through Crypto Pack and self-encrypting drives, tape archives, Storage Area Networks, virtual workloads, and a growing list of vendors supporting the OASIS Key Management Interoperability Protocol (KMIP) standard.

  • Multiple Key Types: Centrally manages symmetric, asymmetric, secret data, and X.509 certificates along with their associated polices.

  • Full Lifecycle Key Support and Automated Operations: Simplifies the management of encryption keys across the entire lifecycle including secure key generation, storage and backup, key distribution and key deactivation and deletion.  SafeNet KeySecure makes automated, policy driven operations easy for tasks such as key expiry and key rotation.

  • Centralized Administration of Granular Access, Authorization Controls and Separation of Duties: Management console unifies key management operations across multiple encryption deployments and products while ensuring administrators are restricted roles defined for their scope of responsibilities. 

  • High-Availability and Intelligent Key Sharing: Deploys in flexible high-availability configurations within an operations center and across geographically dispersed centers or service provider environments using an active-active mode of clustering.

  • Auditing and Logging:  Centralized management includes detailed logging and audit tracking of all key state changes, administrator access and policy changes. Audit trails are securely stored and signed for non-repudiation and can be consumed by leading 3rd party SIEM tools.

  • Next-Generation Solution for NetApp Storage:  The official upgrade for existing NetApp DataFort Encryption Appliance and NetApp Storage Encryption deployed with the NetApp Lifetime Key Manager.

  • Format Preserving Encryption (FPE): Securely encrypts structured data such as credit cards or social security numbers.

  • Infield Software Updates: Ensures easy installation of new features, core software updates and security patches. Additionally you can run older appliances in cluster with new appliances.
CTA - KeySecure k460 w/Brocade Encryption WP
CTA Chart Path Key Mgmt
CTA Enterprise Key Managment CTA
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.