Contact Us

CJIS Compliance Solutions

Criminal Justice Information Services (CJIS) Security Policy

Green User Authentication Icon

A joint program of the FBI, State Identification Bureaus, and CJIS Systems Agency, the Criminal Justice Information Services (CJIS) Security Policy outlines the security precautions that must be taken to protect sensitive information like fingerprints and criminal backgrounds gathered by local, state, and federal criminal justice and law enforcement agencies.

The CJIS Security Policy contains specific requirements for wireless networking, remote access, encryption, certification of cryptographic modules, and minimum key lengths.

Criminal justice and law enforcement agencies should become familiar with the requirements set by the CJIS policy prior to procurement and deployment of affected systems.

Gemalto delivers remote access, multi-factor authentication, and encryption capabilities that ensure security of data throughout an organization, whether data is at rest, in transit, or in use.

Gemalto's SafeNet Products for CJIS Compliance:

Secure Access with Multi-Factor Authentication

Multi-Factor Authentication

Multi-factor authentication serves a vital function within any organization – securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. Our authentication-as-a-service, authentication management, and wide variety of authentication form factors enable organizations to establish and easily administer reliable access control policies, all while following strong authentication best practices.

Learn More About Multi-Factor Authentication
Network Encryption for CJIS Compliance

Data-in-Motion Encryption

SafeNet High Speed Encryptors deliver certified Layer 2 network encryption, ensuring the most secure data-in-motion protection, maximum performance, near-zero overhead with “set and forget” management, and lowest total cost of ownership. CJIS-SP requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency. SafeNet High Speed Encryptors can help provide control to protect the full life cycle of CJI in transit.

Learn More About Data-in-Transit Encryption for CJIS
Data Encryption Icon

Data at Rest Encryption Products

In addition to SafeNet High Speed Encryptors, there are a broad range of SafeNet data encryption solutions that enable organizations to move past silo-constrained encryption and to centrally, uniformly deployed encryption in a scalable manner that spans the enterprise, and effectively control their CJI security policies. These solutions deliver unmatched coverage – securing databases, applications, personal identifiable information (PII), and storage in the physical and virtual data center and the cloud.

Learn More About Data Encryption

Featured CJIS Compliance Resources

Choosing an Authentication Solution for Criminal Justice Information System (CJIS) Services

With the crucial need to share criminal justice information (CJI) comes the need to protect this sensitive information, the leakage of which can affect the effectiveness of ongoing cr

Get this resource

How to become CJIS Compliant with SafeNet Authentication - Solution Brief

Get this resource

CJIS Data-in-Transit Encryption Standards - White Paper

For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to ensure tha

Get this resource

Police Department Addresses CJIS Compliance with Gemalto Strong Authentication - Case Study

To address its security policies and comply with CJIS mandates, a large US metropolitan police department used Gemalto solutions to institute more robust authentication for police officers a

Get this resource

Survey of Authentication Technologies - White Paper

Get this resource

Are You CJIS-Ready? Infographic

As part of the new CJIS Security Policy (CJIS-SP) to protect sensitive information—the leakage of which can reduce the effectiveness of ongoing crime-fighting operations—as of September 1, 2

Get this resource
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.