Contact Us

SafeNet Cipher Technology Partners

SafeNet Cipher Technology Partner Program

SafeNet Cipher Technology Partner Logo

The SafeNet Cipher Technology Partner Program provides technical, marketing, and business development support to vendors that add SafeNet solutions to secure their products.

Gemalto uses its resources as a leader in data security to support members in promoting their solutions and satisfying an ever-growing customer base.

Our partners are essential to customer success. Technology partners work with Gemalto to expand opportunities in the enhanced security marketplace and to forge innovative interoperability relationships. A full line of technical guides and software development kits (SDKs) are available to help with the integration process. Download our program overview guide to learn more about the benefits of our program.

How can we help you?

Find a SafeNet Technology Partner
Find a Partner

Find out how SafeNet products integrate with our partners' solutions to secure data, identities, transactions, and more

Explore our integrations
Become a SafeNet Technology Partner
Become a Partner

Become a partner to receive recognition for your security integrations, go-to-market support, and a Gemalto point of contact

Platinum Partners

Partner Name

SafeNet Integrated Solutions

Amazon Web Services HSM, Key Management, Encryption, Authentication
Dell Authentication, Encryption, Key Management
IBM HSM, Authentication, Key Management, Encryption
Microsoft HSM, Authentication, Key Management, Encryption
NetApp Encryption, Key Management

Gold Partners

Partner Name

SafeNet Integrated Solutions

Blue Coat Encryption
Citrix Authentication
Entrust Datacard HSM, Authentication
F5 Networks HSM, Authentication
Hitachi Data Systems Key Management
HP Authentication, Encryption, Key Management
Oracle HSM, Authentication
Palo Alto Networks HSM, Authentication
Skyhigh Networks HSM, Key Management
Symantec HSM, Authentication, Key Management
VMware Encryption, Authentication

Silver Partners

Partner Name

SafeNet Integrated Solutions

4Point HSM
ACI Worldwide HSM
Aconite HSM
AdNovum Informatik AG HSM
Adobe HSM, Authentication
AEP Networks HSM
AirWatch Authentication
AJB Software Design Inc. HSM
Andxor Corporation HSM
Apache HSM, Encryption
Apple Authentication
Arius Technology HSM
Ascertia HSM
Atlantic-Zeiser Ltd HSM
Attachmate Authentication
AustriaCard GmbH HSM
Avow HSM
Axway HSM
Banksoft Corporation HSM
Barnes International HSM
Becrypt Authentication
BIO-key Authentication
Blue Ridge Networks Authentication
BMC Authentication
Brocade Key Management
CA Technologies HSM
Ceedo Authentication
Certes Networks (formerly Cipheroptics) HSM
Check Point Software Authentication
CipherCloud Key Management
Ciphermail HSM
Cisco Authentication
Clear2Pay HSM
Cloud Foundry Key Management 
Cloudera Encryption
Compass Plus HSM
Commvault Key Management
Corestreet/AI HSM
Couchbase Encryption
Cryptomathic HSM
CryptoVision/cv cryptovision gmbh HSM
Cubic Transportation Systems HSM, Key Management
CyberArk HSM, Authentication
Cyberoam Authentication
Dataguise Key Management 
Debian HSM
Digicert, Inc. Authentication
Dropbox Encryption, Key Management, Authentication
EMC Encryption
Eruces, Inc. HSM
Evidian Authentication
Evolium HSM
Exostar Authentication
FalconStor Key Management
FIS (Fidelity) HSM
Fortinet Authentication
G&D (Giesecke & Devrient) HSM
GE Energy HSM
GlobalSign Inc. HSM, Authentication
Handpoint HSM
HB Technologies (Algeria) HSM
Hightech Payment Systems HSM
HID/ActivIdentity HSM, Encryption
Hortonworks Key Management, Encryption
Identrust HSM, Authentication
Imperva Inc. HSM
IMS Health (was Diversinet) HSM
Infoblox HSM
Innovery HSM
Intercede Group HSM
International Game Technology (IGT) HSM, Authentication
Interpro Technology, Inc. HSM
Intesi Group HSM
Itron, Inc. HSM
Juniper Authentication
Keyon AG HSM
Kyberpass Corporation Authentication
Landis & Gyr HSM
Linux Authentication
McAfee Authentication
MobileIron Authentication, Key Management, HSM
Modirum HSM
Monet+ HSM
MongoDB Encryption
Morpho HSM
Motorola HSM
MultiCert HSM
N&TS Group HSM
Nagra ID HSM
NBS Technologies, Inc./Ubiq HSM
NCR Corporation HSM
NetMotion Authentication
Netskope Key Management
NetSuite Authentication
neXus HSM
Nuance HSM
Nutanix  Key Management
Oberthur Card Systems HSM
OCEUS Authentication
OpenSSH Authentication
OpenTrust HSM
OpenWay Group HSM
PayPros HSM
Ping Identity HSM, Authentication
Pivotal Key Management 
PKWare Key Management
Prime Factors HSM
PrimeKey (EBJCA) HSM
Pronit/Cardhall HSM
Protegrity HSM
Quantum Key Management
RedHat HSM
RIM/Certicom HSM, Authentication
Riverbed Encryption
RJR Innnovations, Inc. Authentication
RS2 Software p.l.c. HSM
S2M HSM Authentication
Samsung Authentication
Secunet Security Networks AG HSM
SecureKey Technologies HSM
Seglan HSM
Sensus HSM
Silver Spring Networks HSM
SmartSoft (Cardtek Group) HSM
SoftFinanca HSM
Sophos Authentication
ST Microelectronics HSM
Symbiont HSM
Syncplicity Authentication
Taigle HSM
Tantacomm Key Management
TechTrex Inc. HSM
Tellwise HSM
Teradata Key Management
Titus HSM
Totemo HSM
Townsend Security  Key Management
Trilliant HSM
TrustCentral HSM
Trusted Security Solutions HSM
TSYS Card Tech HSM
Vaultive Key Management
VCE Encryption
Velocidata, Inc. HSM
Venafi, Inc. HSM
Verifone, Inc. HSM
Verizon HSM
WatchDox HSM, Authentication
WatchGuard Authentication
Wincor-Nixdorf HSM
Winmagic Inc. Authentication
X InfoTech HSM
Xceedium Inc. HSM, Authentication
Zendesk Authentication
Zertificon Solutions GmbH HSM
Zoho Authentication
Zscaler Authentication

Engage with Us Through Technology

Authentication for Access Control Icon

Gemalto offers industry-leading authentication solutions driven by the broadest range of authenticators with unified management options and multiple integration options. These solutions give partners the tools they need to enhance their solution and provide value to customers. Integration options include:

  • Broad certificate-based / PKI authentication including interfaces for PKCS#11 v2.x, Microsoft CAPI, PC/SC, X.509 v3 certificate storage, SSL v3, Java, IPsec/IKE interfaces
  • Support for RADIUS, SAML, and OATH
  • Cross platform support covering traditional infrastructure (Windows, Mac, Linux and mobile (iOS Android, Microsoft and Blackberry)

Learn More

Virtualization and Cloud Security Icon

SafeNet ProtectV provides full-drive encryption for virtual machines, instances, and storage containers. This enables organizations to confidently move their sensitive data to the cloud and virtualized data centers.

  • ProtectV Integration – SafeNet ProtectV manager provides APIs to automate the entire management process enabling cloud and virtualization migration, orchestration, and management solutions to enable customers to maintain ownership, compliance and control of their data.

Learn More

Hardware Security Modules

SafeNet Hardware Security Modules (HSMs) provide reliable protection for identities, transactions, and applications by securing cryptographic keys, as well as provisioning of encryption, decryption, authentication, and digital signing services. Integration options include PKCS#11, Microsoft CAPI, CNG, JCA/JCE, and OpenSSL.

Learn More

Green Key Management Icon

SafeNet KeySecure provides Enterprise Key Management (EKM) from a single, centralized platform for managing cryptographic keys in both SafeNet and partner solutions including key generation, key import and export, key rotation, and much more. By working with our partners, we can mutually enable our customers to simultaneously manage keys enterprise wide through a single, centralized key management platform and remove the burden and challenges of key management from our partner’s solutions.

  • KMIP – Gemalto is a leading adopter of the Key Management Interoperability Protocol and a broad adopter of KMIP with our partners.
  • KeySecure also includes APIS for iCAPI, KMIP, PKCS #11, JCE, MSCAPI, and .NET.

Learn More

Application Security Icon

The SafeNet family of Connectors — ProtectApp, ProtectDB, ProtectV, ProtectFile, Tokenization Manager, and Storage Secure — work with SafeNet KeySecure for application, database, mainframe, and file protection, allowing partners who develop customized security solutions to expand their products.

Learn More

Benefits of Being a SafeNet Cipher Technology Partner

Discover how Gemalto's Cipher Partner Program recognizes, rewards, & supports our partnerships and collaborative solutions to drive incremental growth & revenue. Download our program overview guide to learn more about the benefits of our program.

Additionally, Technology Partners are provided access to the SafeNet Cipher Partner Portal , where they can update and change information about their companies and solutions.

Technology Partner Tiers:





Support Requirements Materials, brief written statement, and contact information required to produce a dedicated “Technology Partner” web page.
  • Development and execution of a co-marketing and sales plan.

  • Regularly scheduled meetings tracking progress against plan.

  • Invitation only

  • Strategic partnership

Technical Integration Requirements " Verified"
Proof-of-Integration is provided by either partner or by a third party in the form of an integration document.
  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

Technology Partner Technical Integration Requirements:

Verified Partner Logo

Verified Integration

"Verified Integration" is achieved by providing documented proof of integration. This can be provided by either partner (SafeNet or Technology Partner) or by a Third Party in the form of an “integration document” that must contain all of the following:

  • Technology Partner Solution Name and Description

  • SafeNet Solution Name and Description

  • Scope of Integration

  • Supported Platforms and Versions

  • Technical Partner and SafeNet Solution Prerequisites

  • Screen Shot or any Supporting Evidence of Integrated Solution

The “integration document” can come in the following forms:

  • Integration Document

  • A Section within a Comprehensive User Guide or Online Help (SafeNet or Partner’s). All of the following must be provided:

    • A Copy of the Specific Section in Reference to Integrated Solution

    • Reference Information Such as URLs, Page Numbers, or Documentation Names

Certified Partner Logo

Certified Integration

A Certified Integration requires documented proof of integration by SafeNet; documentation by the Technology Partner or a Third Party does not suffice. The document must have all the requirements of the “integration document” for a Verified integration, and additionally:

  • The integrated solution must be tested, proven, and verified by SafeNet

  • AND

  • A stand-alone and dedicated integration guide must be produced, edited, and approved by SafeNet. The integration guide may be based on a document produced by the Technology Partner or Third Party, but the final document must be completed by SafeNet.


Apply Now to SafeNet Cipher Technology Partner Program
Technology Partner Search
Breach Level Index Site
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.