Contact Us

Gemalto Cipher Technology Partners

Gemalto Cipher Technology Partner Program

SafeNet Cipher Technology Partner Logo

Gemalto’s Cipher Technology (Integration) Partner Program provides technical, marketing, and business development support to partners who want to enhance their services and technologies by validating and documenting integration with Gemalto products.

The Technology Program is a vital and vibrant part of our partner ecosystem. Our Technology (Integration) Partners are vendors that want to validate the integration between their product and a Gemalto product. Gemalto encourages the interoperability between our products and other vendors and supports those efforts. 

Technology Partners receive recognition for successful integration with our products, as well as benefits such as access to tools and technical information that support their business development and marketing efforts. Click here to learn more about the benefits of the program. 

Find a Partner

Find out how Gemalto products integrate with our partners' solutions to secure data, identities, transactions, and more.

Explore our Integrations
Become a Partner

Become a partner to receive recognition for your security integrations and get access to go-to-market support. 

Become a Technology Partner

Platinum Partners

Partner Name

SafeNet Integrated Solutions

Amazon Web Services (AWS) HSM,Authentication,Encryption,Key Management
Dell EMC Authentication,Encryption,Key Management
Dell Technologies HSM,Authentication,Encryption,Key Management,Access Management
IBM HSM,Authentication,Encryption,Key Management
Microsoft HSM,Authentication,Encryption,Key Management
NetApp Encryption,Key Management

Gold Partners

Partner Name

SafeNet Integrated Solutions

Blue Coat Authentication,Encryption
Citrix HSM,Authentication
Datacard Group HSM
F5 Networks HSM,Authentication
Hewlett-Packard (HP) Authentication,Encryption,Key Management
Hitachi Key Management
Palo Alto Networks HSM,Authentication
Symantec HSM,Authentication,Key Management
VMware Authentication,Encryption

Silver Partners

Partner Name

SafeNet Integrated Solutions

4Point HSM
ACI Worldwide HSM
Aconite HSM
AdNovum Informatik AG HSM
Adobe HSM,Authentication
AEP Networks HSM
AirWatch Authentication
AJB Software Design Inc. HSM
ANDXOR Corporation HSM
Apache HSM,Authentication,Encryption
Apereo Authentication
Apple Authentication
Arius Technology HSM
Ascertia HSM
Atlantic Zeiser HSM
Atlassian Authentication
Attachmate Authentication
AustriaCard GmbH HSM
Automattic Authentication
Avow HSM
Axway HSM
Banksoft Corporation HSM
Barnes International HSM
Barracuda Networks, Inc Authentication
BeCrypt Authentication
BIO-key Authentication
Blue Ridge Networks Authentication
BMC Authentication
Brocade Key Management
CA Technologies HSM,Authentication
Ceedo Authentication
Centrify HSM
Certes Networks HSM
Check Point Software Authentication
Ciena Encryption
CipherCloud Key Management
CipherMail (formerly DJIGZO) HSM
Cisco Authentication
Clear2Pay HSM
Cloud Foundry Key Management
Cloudera Encryption
Commvault Key Management
Compass Plus HSM
Corestreet HSM
Couchbase Encryption
Cryptomathic HSM
CryptoVision HSM
Cubic Transportation Systems HSM,Key Management
CyberArk HSM,Authentication
Cyberoam Authentication
Dataguise Key Management
Datalogics HSM
Debian HSM
DenyAll Authentication
Device Authority HSM
Digicert, Inc. Authentication
Dropbox Authentication,Encryption,Key Management
Drupal Authentication
Entrust Datacard HSM,Authentication
Ericom Authentication
Ericsson HSM
Eruces, Inc. HSM
Evidian Authentication
Evolium HSM
Exostar Authentication
FalconStor Key Management
FIS (Fidelity) HSM
ForgeRock Authentication
Fortinet Authentication
G and D (Giesecke and Devrient) HSM
GE Energy HSM
GlobalSign Inc. HSM,Authentication
Google Authentication,Encryption
Handpoint HSM
HB Technologies HSM
HID (ActivIdentity) HSM,Encryption
Hortonworks Encryption,Key Management
HPS Worldwide HSM
Huawei Key Management
IAM Cloud Authentication
Identrust Inc. HSM,Authentication
IDnomic (formerly OpenTrust) HSM,Authentication
IGEL Authentication
Imperva Inc. HSM
Imprivata Authentication
IMS Health HSM
Infoblox HSM
Innovery HSM
Intelligent Wave Inc. HSM
Intercede Group HSM,Authentication
International Game Technoloy (IGT) HSM,Authentication
Interpro Technology, Inc. HSM
Intesi Group HSM
Itron, Inc. HSM
Juniper Authentication
Keyon AG HSM
Landis and Gyr HSM
Lieberman Software Authentication
Linux Authentication
ManageEngine Authentication
McAfee Authentication
MobileIron HSM,Authentication,Key Management
Modirum HSM
Monet+ HSM
MongoDB Encryption
Morpho HSM
Motorola HSM
MultiCert HSM
N and TS Group HSM
Nagra ID HSM
NBS Technologies, Inc. HSM
NCR Corporation HSM
NetDocuments Authentication
NetMotion Authentication
NetScout HSM,Key Management
NetSet HSM
Netskope Key Management
NetSuite Authentication
Nexus HSM
Nuance HSM
Nutanix Key Management
Oberthur Card Systems HSM
OCEUS Authentication
OpenIAM Authentication
OpenSSH Authentication
OpenWay Group HSM
Oracle HSM,Authentication
OSC Authentication
PayPros HSM
Ping Identity HSM,Authentication
Pivotal Key Management
PKWare Authentication,Key Management
Prime Factors HSM
PrimeKey HSM
Pronit (Cardhall) HSM
Protegrity HSM
Pulse Secure Authentication
Quantum Key Management
Radiant Logic Authentication
RedHat HSM
RIM (Certicom) HSM,Authentication
Riverbed Encryption
RJR Innovations, Inc. Authentication
RS2 Software p.l.c. HSM
Safelayer Secure Communications Authentication Authentication
Samsung Authentication
Secunet Security Networks AG HSM
SecureKey Technologies HSM
Seglan HSM
Senetas Corporation Encryption
Sensus HSM
Silver Springs Networks HSM
Skyhigh Networks HSM,Key Management
SmartSoft (Cardtek Group) HSM
SoftFinanca HSM
Sophos Authentication
SSH Communications Security Authentication
ST Microelectronics HSM
Stormshield Authentication
Symbiont HSM
Synacor Authentication
Syncplicity Authentication
Tableau Authentication
Taigle HSM
Tantacomm Key Management
TechTrex, Inc. HSM
Tellwise HSM
Teradata Key Management
Titus HSM
Totemo HSM
Townsend Security Key Management
Trilliant HSM
Trust Central HSM
Trusted Security Solutions HSM
TSYS Card Tech HSM
UL (formerly Collis) HSM
Vaultive Key Management
VCE Encryption
Velocidata, Inc. HSM
Venafi, Inc. HSM
VeriFone, Inc. HSM
Verisign Authentication
Verizon HSM
Versasec Authentication
ViaSat Encryption
WatchDox HSM,Authentication
WatchGuard Authentication
Wincor Nixdorf HSM
Winmagic, Inc. Authentication
Workspot Authentication
Wrike Authentication
X InfoTech HSM
Xceedium, Inc. HSM,Authentication
Zendesk Authentication
Zertificon Solutions GmbH HSM
Zoho Authentication
Zscaler Authentication

Engage with Us Through Technology

Authentication for Access Control Icon

Gemalto offers industry-leading authentication solutions driven by the broadest range of authenticators with unified management options and multiple integration options. These solutions give partners the tools they need to enhance their solution and provide value to customers. Integration options include:

  • Broad certificate-based / PKI authentication including interfaces for PKCS#11 v2.x, Microsoft CAPI, PC/SC, X.509 v3 certificate storage, SSL v3, Java, IPsec/IKE interfaces
  • Support for RADIUS, SAML, and OATH
  • Cross platform support covering traditional infrastructure (Windows, Mac, Linux and mobile (iOS Android, Microsoft and Blackberry)

Learn More

Virtualization and Cloud Security Icon

SafeNet ProtectV provides full-drive encryption for virtual machines, instances, and storage containers. This enables organizations to confidently move their sensitive data to the cloud and virtualized data centers.

  • ProtectV Integration – SafeNet ProtectV manager provides APIs to automate the entire management process enabling cloud and virtualization migration, orchestration, and management solutions to enable customers to maintain ownership, compliance and control of their data.

Learn More

Hardware Security Modules

SafeNet Hardware Security Modules (HSMs) provide reliable protection for identities, transactions, and applications by securing cryptographic keys, as well as provisioning of encryption, decryption, authentication, and digital signing services. Integration options include PKCS#11, Microsoft CAPI, CNG, JCA/JCE, and OpenSSL.

Learn More

Green Key Management Icon

SafeNet KeySecure provides Enterprise Key Management (EKM) from a single, centralized platform for managing cryptographic keys in both SafeNet and partner solutions including key generation, key import and export, key rotation, and much more. By working with our partners, we can mutually enable our customers to simultaneously manage keys enterprise wide through a single, centralized key management platform and remove the burden and challenges of key management from our partner’s solutions.

  • KMIP – Gemalto is a leading adopter of the Key Management Interoperability Protocol and a broad adopter of KMIP with our partners.
  • KeySecure also includes APIS for iCAPI, KMIP, PKCS #11, JCE, MSCAPI, and .NET.

Learn More

Application Security Icon

The SafeNet family of Connectors — ProtectApp, ProtectDB, ProtectV, ProtectFile, and Tokenization Manager — work with SafeNet KeySecure for application, database, mainframe, and file protection, allowing partners who develop customized security solutions to expand their products.

Learn More

Benefits of Being a Gemalto Cipher Technology Partner

Discover how Gemalto's Cipher Partner Program recognizes, rewards, & supports our partnerships and collaborative solutions to drive incremental growth & revenue. Click here to learn more about the benefits of our program.

Technology Partners receive access to the Cipher Partner Portal , where they can update and change information about their companies and solutions.

Technology Partner Technical Integration Requirements:

Every Technology (Integration) Partner will be asked to provide technical documentation of their integrations with Gemalto solutions. Gemalto requires documentation of the integrations by Gemalto, the Technology Partner or by a third party. The integration document must contain the following:

  • Partner solution name and description

  • Gemalto solution name and description

  • Scope of integration

  • Supported platforms and versions

  • Partner and Gemalto solution pre-requisites

  • Screen shot or any supporting evidence of the integration

Acceptable formats for the required integration document include:

  • A stand-alone and dedicated integration guide for the partner and Gemalto solution

  • A section within a comprehensive user guide or online help (Gemalto or Technology Partner) that includes a copy of the specific section in reference to the integration solution

  • Reference information such as URLs, page numbers, or documentation names

Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.