Contact Us

SafeNet Cipher Technology Partners

SafeNet Cipher Technology Partner Program

SafeNet Cipher Technology Partner Logo

The SafeNet Cipher Technology Partner Program provides technical, marketing, and business development support to vendors that add SafeNet solutions to secure their products.

Gemalto uses its resources as a leader in data security to support members in promoting their solutions and satisfying an ever-growing customer base.

Our partners are essential to customer success. Technology partners work with Gemalto to expand opportunities in the enhanced security marketplace and to forge innovative interoperability relationships. A full line of technical guides and software development kits (SDKs) are available to help with the integration process. Download our program overview guide to learn more about the benefits of our program.

How can we help you?

Find a SafeNet Technology Partner
Find a Partner

Find out how SafeNet products integrate with our partners' solutions to secure data, identities, transactions, and more

Explore our integrations
Become a SafeNet Technology Partner
Become a Partner

Become a partner to receive recognition for your security integrations, go-to-market support, and a Gemalto point of contact

Platinum Partners

Partner Name

SafeNet Integrated Solutions

Amazon Web Services (AWS) HSM,Authentication,Encryption,Key Management
Dell EMC Authentication,Encryption,Key Management
IBM HSM,Authentication,Encryption,Key Management
Microsoft HSM,Authentication,Encryption,Key Management
NetApp Encryption,Key Management

Gold Partners

Partner Name

SafeNet Integrated Solutions

Blue Coat Authentication,Encryption
Citrix HSM,Authentication
Datacard Group HSM
F5 Networks HSM,Authentication
Hewlett-Packard (HP) Authentication,Encryption,Key Management
Hitachi Key Management
Palo Alto Networks HSM,Authentication
Symantec HSM,Authentication,Key Management
VMware Authentication,Encryption

Silver Partners

Partner Name

SafeNet Integrated Solutions

4Point HSM
ACI Worldwide HSM
Aconite HSM
AdNovum Informatik AG HSM
Adobe HSM,Authentication
AEP Networks HSM
AirWatch Authentication
AJB Software Design Inc. HSM
ANDXOR Corporation HSM
Apache HSM,Authentication,Encryption
Apereo Authentication
Apple Authentication
Arius Technology HSM
Ascertia HSM
Atlantic Zeiser HSM
Atlassian Authentication
Attachmate Authentication
AustriaCard GmbH HSM
Automattic Authentication
Avow HSM
Axway HSM
Banksoft Corporation HSM
Barnes International HSM
Barracuda Networks, Inc Authentication
BeCrypt Authentication
BIO-key Authentication
Blue Ridge Networks Authentication
BMC Authentication
Brocade Key Management
CA Technologies HSM,Authentication
Ceedo Authentication
Centrify HSM
Certes Networks HSM
Check Point Software Authentication
Ciena Encryption
CipherCloud Key Management
CipherMail (formerly DJIGZO) HSM
Cisco Authentication
Clear2Pay HSM
Cloud Foundry Key Management
Cloudera Encryption
Commvault Key Management
Compass Plus HSM
Corestreet HSM
Couchbase Encryption
Cryptomathic HSM
CryptoVision HSM
Cubic Transportation Systems HSM,Key Management
CyberArk HSM,Authentication
Cyberoam Authentication
Dataguise Key Management
Datalogics HSM
Debian HSM
DenyAll Authentication
Digicert, Inc. Authentication
Dropbox Authentication,Encryption,Key Management
Drupal Authentication
Entrust Datacard HSM,Authentication
Ericom Authentication
Ericsson HSM
Eruces, Inc. HSM
Evidian Authentication
Evolium HSM
Exostar Authentication
FalconStor Key Management
FIS (Fidelity) HSM
ForgeRock Authentication
Fortinet Authentication
G and D (Giesecke and Devrient) HSM
GE Energy HSM
GlobalSign Inc. HSM,Authentication
Google Authentication,Encryption
Handpoint HSM
HB Technologies HSM
HID (ActivIdentity) HSM,Encryption
Hortonworks Encryption,Key Management
HPS Worldwide HSM
Huawei Key Management
IAM Cloud Authentication
Identrust Inc. HSM,Authentication
IDnomic (formerly OpenTrust) HSM,Authentication
IGEL Authentication
Imperva Inc. HSM
Imprivata Authentication
IMS Health HSM
Infoblox HSM
Innovery HSM
Intelligent Wave Inc. HSM
Intercede Group HSM,Authentication
International Game Technoloy (IGT) HSM,Authentication
Interpro Technology, Inc. HSM
Intesi Group HSM
Itron, Inc. HSM
Juniper Authentication
Keyon AG HSM
Landis and Gyr HSM
Lieberman Software Authentication
Linux Authentication
ManageEngine Authentication
McAfee Authentication
MobileIron HSM,Authentication,Key Management
Modirum HSM
Monet+ HSM
MongoDB Encryption
Morpho HSM
Motorola HSM
MultiCert HSM
N and TS Group HSM
Nagra ID HSM
NBS Technologies, Inc. HSM
NCR Corporation HSM
NetDocuments Authentication
NetMotion Authentication
NetScout HSM,Key Management
NetSet HSM
Netskope Key Management
NetSuite Authentication
Nexus HSM
Nuance HSM
Nutanix Key Management
Oberthur Card Systems HSM
OCEUS Authentication
OpenIAM Authentication
OpenSSH Authentication
OpenWay Group HSM
Oracle HSM,Authentication
OSC Authentication
PayPros HSM
Ping Identity HSM,Authentication
Pivotal Key Management
PKWare Authentication,Key Management
Prime Factors HSM
PrimeKey HSM
Pronit (Cardhall) HSM
Protegrity HSM
Pulse Secure Authentication
Quantum Key Management
Radiant Logic Authentication
RedHat HSM
RIM (Certicom) HSM,Authentication
Riverbed Encryption
RJR Innovations, Inc. Authentication
RS2 Software p.l.c. HSM
Safelayer Secure Communications Authentication Authentication
Samsung Authentication
Secunet Security Networks AG HSM
SecureKey Technologies HSM
Seglan HSM
Senetas Corporation Encryption
Sensus HSM
Silver Springs Networks HSM
Skyhigh Networks HSM,Key Management
SmartSoft (Cardtek Group) HSM
SoftFinanca HSM
Sophos Authentication
SSH Communications Security Authentication
ST Microelectronics HSM
Stormshield Authentication
Symbiont HSM
Synacor Authentication
Syncplicity Authentication
Tableau Authentication
Taigle HSM
Tantacomm Key Management
TechTrex, Inc. HSM
Tellwise HSM
Teradata Key Management
Titus HSM
Totemo HSM
Townsend Security Key Management
Trilliant HSM
Trust Central HSM
Trusted Security Solutions HSM
TSYS Card Tech HSM
UL (formerly Collis) HSM
Vaultive Key Management
VCE Encryption
Velocidata, Inc. HSM
Venafi, Inc. HSM
VeriFone, Inc. HSM
Verisign Authentication
Verizon HSM
Versasec Authentication
ViaSat Encryption
WatchDox HSM,Authentication
WatchGuard Authentication
Wincor Nixdorf HSM
Winmagic, Inc. Authentication
Workspot Authentication
Wrike Authentication
X InfoTech HSM
Xceedium, Inc. HSM,Authentication
Zendesk Authentication
Zertificon Solutions GmbH HSM
Zoho Authentication
Zscaler Authentication

Engage with Us Through Technology

Authentication for Access Control Icon

Gemalto offers industry-leading authentication solutions driven by the broadest range of authenticators with unified management options and multiple integration options. These solutions give partners the tools they need to enhance their solution and provide value to customers. Integration options include:

  • Broad certificate-based / PKI authentication including interfaces for PKCS#11 v2.x, Microsoft CAPI, PC/SC, X.509 v3 certificate storage, SSL v3, Java, IPsec/IKE interfaces
  • Support for RADIUS, SAML, and OATH
  • Cross platform support covering traditional infrastructure (Windows, Mac, Linux and mobile (iOS Android, Microsoft and Blackberry)

Learn More

Virtualization and Cloud Security Icon

SafeNet ProtectV provides full-drive encryption for virtual machines, instances, and storage containers. This enables organizations to confidently move their sensitive data to the cloud and virtualized data centers.

  • ProtectV Integration – SafeNet ProtectV manager provides APIs to automate the entire management process enabling cloud and virtualization migration, orchestration, and management solutions to enable customers to maintain ownership, compliance and control of their data.

Learn More

Hardware Security Modules

SafeNet Hardware Security Modules (HSMs) provide reliable protection for identities, transactions, and applications by securing cryptographic keys, as well as provisioning of encryption, decryption, authentication, and digital signing services. Integration options include PKCS#11, Microsoft CAPI, CNG, JCA/JCE, and OpenSSL.

Learn More

Green Key Management Icon

SafeNet KeySecure provides Enterprise Key Management (EKM) from a single, centralized platform for managing cryptographic keys in both SafeNet and partner solutions including key generation, key import and export, key rotation, and much more. By working with our partners, we can mutually enable our customers to simultaneously manage keys enterprise wide through a single, centralized key management platform and remove the burden and challenges of key management from our partner’s solutions.

  • KMIP – Gemalto is a leading adopter of the Key Management Interoperability Protocol and a broad adopter of KMIP with our partners.
  • KeySecure also includes APIS for iCAPI, KMIP, PKCS #11, JCE, MSCAPI, and .NET.

Learn More

Application Security Icon

The SafeNet family of Connectors — ProtectApp, ProtectDB, ProtectV, ProtectFile, and Tokenization Manager — work with SafeNet KeySecure for application, database, mainframe, and file protection, allowing partners who develop customized security solutions to expand their products.

Learn More

Benefits of Being a SafeNet Cipher Technology Partner

Discover how Gemalto's Cipher Partner Program recognizes, rewards, & supports our partnerships and collaborative solutions to drive incremental growth & revenue. Download our program overview guide to learn more about the benefits of our program.

Additionally, Technology Partners are provided access to the SafeNet Cipher Partner Portal , where they can update and change information about their companies and solutions.

Technology Partner Tiers:





Support Requirements Materials, brief written statement, and contact information required to produce a dedicated “Technology Partner” web page.
  • Development and execution of a co-marketing and sales plan.

  • Regularly scheduled meetings tracking progress against plan.

  • Invitation only

  • Strategic partnership

Technical Integration Requirements " Verified"
Proof-of-Integration is provided by either partner or by a third party in the form of an integration document.
  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

Technology Partner Technical Integration Requirements:

Verified Partner Logo

Verified Integration

"Verified Integration" is achieved by providing documented proof of integration. This can be provided by either partner (SafeNet or Technology Partner) or by a Third Party in the form of an “integration document” that must contain all of the following:

  • Technology Partner Solution Name and Description

  • SafeNet Solution Name and Description

  • Scope of Integration

  • Supported Platforms and Versions

  • Technical Partner and SafeNet Solution Prerequisites

  • Screen Shot or any Supporting Evidence of Integrated Solution

The “integration document” can come in the following forms:

  • Integration Document

  • A Section within a Comprehensive User Guide or Online Help (SafeNet or Partner’s). All of the following must be provided:

    • A Copy of the Specific Section in Reference to Integrated Solution

    • Reference Information Such as URLs, Page Numbers, or Documentation Names

Certified Partner Logo

Certified Integration

A Certified Integration requires documented proof of integration by SafeNet; documentation by the Technology Partner or a Third Party does not suffice. The document must have all the requirements of the “integration document” for a Verified integration, and additionally:

  • The integrated solution must be tested, proven, and verified by SafeNet

  • AND

  • A stand-alone and dedicated integration guide must be produced, edited, and approved by SafeNet. The integration guide may be based on a document produced by the Technology Partner or Third Party, but the final document must be completed by SafeNet.


Apply Now to SafeNet Cipher Technology Partner Program
Technology Partner Search
Breach Level Index Site
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.