Contact Us

SafeNet Cipher Technology Partners

SafeNet Cipher Technology Partner Program

SafeNet Cipher Technology Partner Logo

The SafeNet Cipher Technology Partner Program provides technical, marketing, and business development support to vendors that add SafeNet solutions to secure their products.

Gemalto uses its resources as a leader in data security to support members in promoting their solutions and satisfying an ever-growing customer base.

Our partners are essential to customer success. Technology partners work with Gemalto to expand opportunities in the enhanced security marketplace and to forge innovative interoperability relationships. A full line of technical guides and software development kits (SDKs) are available to help with the integration process. Download our program overview guide to learn more about the benefits of our program.

How can we help you?

Find a SafeNet Technology Partner
Find a Partner

Find out how SafeNet products integrate with our partners' solutions to secure data, identities, transactions, and more

Explore our integrations
Become a SafeNet Technology Partner
Become a Partner

Become a partner to receive recognition for your security integrations, go-to-market support, and a Gemalto point of contact

Platinum Partners

Partner Name


SafeNet Integrated Solutions

Amazon Web Services   HSM, Key Management, Encryption, Authentication
Dell   Authentication, Encryption, Key Management
IBM   HSM, Authentication, Key Management, Encryption
Microsoft   HSM, Authentication, Key Management, Encryption
NetApp   Encryption, Key Management

Gold Partners

Partner Name


SafeNet Integrated Solutions

Blue Coat   Encryption
Box   HSM
Citrix   Authentication
Entrust Datacard   HSM, Authentication
F5 Networks   HSM, Authentication
Hitachi Data Systems   Key Management
HP   Authentication, Encryption, Key Management
Oracle   HSM, Authentication
Palo Alto Networks   HSM, Authentication
Skyhigh Networks   HSM, Key Management
Symantec   HSM, Authentication, Key Management
VMware   Encryption, Authentication

Silver Partners

Partner Name


SafeNet Integrated Solutions

4Point   HSM
ACI Worldwide   HSM
Aconite   HSM
AdNovum Informatik AG   HSM
Adobe   HSM, Authentication
AEP Networks   HSM
AirWatch   Authentication
AJB Software Design Inc.   HSM
Andxor Corporation   HSM
Apache   HSM, Encryption
Apple   Authentication
Arius Technology   HSM
Ascertia   HSM
Atlantic-Zeiser Ltd   HSM
Attachmate   Authentication
AustriaCard GmbH   HSM
Avow   HSM
Axway   HSM
Banksoft Corporation   HSM
Barnes International   HSM
Becrypt   Authentication
Bell ID   HSM
BIO-key   Authentication
Blue Ridge Networks   Authentication
BMC   Authentication
BPC Group   HSM
Brocade   Key Management
CA Technologies   HSM
Ceedo   Authentication
Certes Networks (formerly Cipheroptics)   HSM
Check Point Software   Authentication
CipherCloud   Key Management
Ciphermail   HSM
Cisco   Authentication
Clear2Pay   HSM
Cloud Foundry   Key Management 
Cloudera   Encryption
Compass Plus   HSM
Commvault   Key Management
Corestreet/AI   HSM
Couchbase   Encryption
Cryptomathic   HSM
CryptoVision/cv cryptovision gmbh   HSM
Cubic Transportation Systems   HSM, Key Management
CyberArk   HSM, Authentication
Cyberoam   Authentication
Dataguise   Key Management 
Debian   HSM
Digicert, Inc.   Authentication
Dropbox   Encryption, Key Management, Authentication
EMC   Encryption
Eruces, Inc.   HSM
Evidian   Authentication
Evolium   HSM
Exostar   Authentication
FalconStor   Key Management
FIS (Fidelity)   HSM
Fortinet   Authentication
G&D (Giesecke & Devrient)   HSM
GE Energy   HSM
GlobalSign Inc.   HSM, Authentication
Handpoint   HSM
HB Technologies (Algeria)   HSM
Hightech Payment Systems   HSM
HID/ActivIdentity   HSM, Encryption
Hortonworks   Key Management, Encryption
Identrust   HSM, Authentication
IDNomic   HSM
Imperva Inc.   HSM
IMS Health (was Diversinet)   HSM
Infoblox   HSM
Innovery   HSM
Intercede Group   HSM
International Game Technology (IGT)   HSM, Authentication
Interpro Technology, Inc.   HSM
Intesi Group   HSM
Itron, Inc.   HSM
Juniper   Authentication
Keyon AG   HSM
Landis & Gyr   HSM
Linux   Authentication
McAfee   Authentication
MobileIron   Authentication, Key Management, HSM
Modirum   HSM
Monet+   HSM
MongoDB   Encryption
Morpho   HSM
Motorola   HSM
MultiCert   HSM
N&TS Group   HSM
Nagra ID   HSM
NBS Technologies, Inc./Ubiq   HSM
NCR Corporation   HSM
NetMotion   Authentication
NetSeT   HSM
Netskope   Key Management
NetSuite   Authentication
neXus   HSM
Nuance   HSM
Nutanix    Key Management
Oberthur Card Systems   HSM
OCEUS   Authentication
OpenSSH   Authentication
OpenWay Group   HSM
PayPros   HSM
Ping Identity   HSM, Authentication
Pivotal   Key Management 
PKWare   Key Management
Prime Factors   HSM
PrimeKey (EBJCA)   HSM
Pronit/Cardhall   HSM
Protegrity   HSM
Quantum   Key Management
RedHat   HSM
RIM/Certicom   HSM, Authentication
Riverbed   Encryption
RJR Innnovations, Inc.   Authentication
RS2 Software p.l.c.   HSM
S2M   HSM   Authentication
Samsung   Authentication
Secunet Security Networks AG   HSM
SecureKey Technologies   HSM
Seglan   HSM
Sensus   HSM
Silver Spring Networks   HSM
SmartSoft (Cardtek Group)   HSM
SoftFinanca   HSM
Sophos   Authentication
ST Microelectronics   HSM
Symbiont   HSM
Syncplicity   Authentication
Taigle   HSM
Tantacomm   Key Management
TAS Group   HSM
TechTrex Inc.   HSM
Tellwise   HSM
Teradata   Key Management
Titus   HSM
Totemo   HSM
Townsend Security    Key Management
Trilliant   HSM
TrustCentral   HSM
Trusted Security Solutions   HSM
TSYS Card Tech   HSM
Vaultive   Key Management
VCE   Encryption
Velocidata, Inc.   HSM
Venafi, Inc.   HSM
Verifone, Inc.   HSM
Verizon   HSM
WatchDox   HSM, Authentication
WatchGuard   Authentication
Wincor-Nixdorf   HSM
Winmagic Inc.   Authentication
X InfoTech   HSM
Xceedium Inc.   HSM, Authentication
Zendesk   Authentication
Zertificon Solutions GmbH   HSM
Zoho   Authentication
Zscaler   Authentication

Engage with Us Through Technology

Authentication for Access Control Icon

Gemalto offers industry-leading authentication solutions driven by the broadest range of authenticators with unified management options and multiple integration options. These solutions give partners the tools they need to enhance their solution and provide value to customers. Integration options include:

  • Broad certificate-based / PKI authentication including interfaces for PKCS#11 v2.x, Microsoft CAPI, PC/SC, X.509 v3 certificate storage, SSL v3, Java, IPsec/IKE interfaces
  • Support for RADIUS, SAML, and OATH
  • Cross platform support covering traditional infrastructure (Windows, Mac, Linux and mobile (iOS Android, Microsoft and Blackberry)

Learn More

Virtualization and Cloud Security Icon

SafeNet ProtectV provides full-drive encryption for virtual machines, instances, and storage containers. This enables organizations to confidently move their sensitive data to the cloud and virtualized data centers.

  • ProtectV Integration – SafeNet ProtectV manager provides APIs to automate the entire management process enabling cloud and virtualization migration, orchestration, and management solutions to enable customers to maintain ownership, compliance and control of their data.

Learn More

Hardware Security Modules

SafeNet Hardware Security Modules (HSMs) provide reliable protection for identities, transactions, and applications by securing cryptographic keys, as well as provisioning of encryption, decryption, authentication, and digital signing services. Integration options include PKCS#11, Microsoft CAPI, CNG, JCA/JCE, and OpenSSL.

Learn More

Green Key Management Icon

SafeNet KeySecure provides Enterprise Key Management (EKM) from a single, centralized platform for managing cryptographic keys in both SafeNet and partner solutions including key generation, key import and export, key rotation, and much more. By working with our partners, we can mutually enable our customers to simultaneously manage keys enterprise wide through a single, centralized key management platform and remove the burden and challenges of key management from our partner’s solutions.

  • KMIP – Gemalto is a leading adopter of the Key Management Interoperability Protocol and a broad adopter of KMIP with our partners.
  • KeySecure also includes APIS for iCAPI, KMIP, PKCS #11, JCE, MSCAPI, and .NET.

Learn More

Application Security Icon

The SafeNet family of Connectors — ProtectApp, ProtectDB, ProtectV, ProtectFile, and Tokenization Manager — work with SafeNet KeySecure for application, database, mainframe, and file protection, allowing partners who develop customized security solutions to expand their products.

Learn More

Benefits of Being a SafeNet Cipher Technology Partner

Discover how Gemalto's Cipher Partner Program recognizes, rewards, & supports our partnerships and collaborative solutions to drive incremental growth & revenue. Download our program overview guide to learn more about the benefits of our program.

Additionally, Technology Partners are provided access to the SafeNet Cipher Partner Portal , where they can update and change information about their companies and solutions.

Technology Partner Tiers:





Support Requirements Materials, brief written statement, and contact information required to produce a dedicated “Technology Partner” web page.
  • Development and execution of a co-marketing and sales plan.

  • Regularly scheduled meetings tracking progress against plan.

  • Invitation only

  • Strategic partnership

Technical Integration Requirements " Verified"
Proof-of-Integration is provided by either partner or by a third party in the form of an integration document.
  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

Technology Partner Technical Integration Requirements:

Verified Partner Logo

Verified Integration

"Verified Integration" is achieved by providing documented proof of integration. This can be provided by either partner (SafeNet or Technology Partner) or by a Third Party in the form of an “integration document” that must contain all of the following:

  • Technology Partner Solution Name and Description

  • SafeNet Solution Name and Description

  • Scope of Integration

  • Supported Platforms and Versions

  • Technical Partner and SafeNet Solution Prerequisites

  • Screen Shot or any Supporting Evidence of Integrated Solution

The “integration document” can come in the following forms:

  • Integration Document

  • A Section within a Comprehensive User Guide or Online Help (SafeNet or Partner’s). All of the following must be provided:

    • A Copy of the Specific Section in Reference to Integrated Solution

    • Reference Information Such as URLs, Page Numbers, or Documentation Names

Certified Partner Logo

Certified Integration

A Certified Integration requires documented proof of integration by SafeNet; documentation by the Technology Partner or a Third Party does not suffice. The document must have all the requirements of the “integration document” for a Verified integration, and additionally:

  • The integrated solution must be tested, proven, and verified by SafeNet

  • AND

  • A stand-alone and dedicated integration guide must be produced, edited, and approved by SafeNet. The integration guide may be based on a document produced by the Technology Partner or Third Party, but the final document must be completed by SafeNet.


Apply Now to SafeNet Cipher Technology Partner Program
Technology Partner Search
Breach Level Index Site
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.