Simplfy Data Security
Accelerate Time to Compliance
Secure Cloud Migration
CipherTrust Manager is the central management point for the CipherTrust Data Security Platform. It provides a unified management console to discover, protect and control sensitive data anywhere across on-premises data stores and multi-cloud deployments.
CipherTrust Manager enforces strong separation of duties while offering multi-tenancy, enabling you to define independent administrative rights for different consumers of resources in different internal departments or geographies
CipherTrust Manager can use FIPS 140-2 Level 3 validated built-in or network attached Luna HSM, Luna Cloud HSM, or third-party HSMs (such as AWS Cloud HSM) for securely storing master key with an elevated root of trust.
Simplify key lifecycle management, including secure key generation, backup/restore, clustering, deactivation and deletion. It provides role-based access controls using existing Active Directory and LDAP credentials and full audit log review
The REST API playground is available to ease your learning curve. CipherTrust management APIs enable comprehensive automation of security workflows involving keys, encryption policies and more
Identify structured and unstructured data that is of risk of exposure, such as PII, PHI, PCI, IP, among other business data
Comply with industry-specific regulatory mandates such as CCPA, HIPAA, PCI DSS, and GDPR
Provide visibility into potential risks that may affect sensitive business information assets, data and processes
Set policies, discover and classify data, rank risks and apply remediation.
Enforce encryption or tokenization to protect against unauthorized access by users and processes
Apply granular, least-privileged user access policies to protect data from external attacks and misuse by privileged users
Identify and stop threats faster with detailed data access audit logs that satisfy compliance requirements and enables security analytics
For all databases and file types
Allows root users to do their job, without abusing data
Accelerate threat detection and ease forensics
Streamline operations, reduce risk, satisfy compliance
Centralized key management across multiple cloud infrastructures and SaaS applications
Separate keys from data, keep secure, and enforce administrative separation of duties
Automated key rotation and data rekeying services for enhanced data security
provides centralized key management for KMIP-compliant devices such as SAN and NAS storage arrays, self-encrypting drives, and hyper-converged infrastructure
simplifies key management across Oracle TDE and Microsoft SQL Database Server, and keep the TDE keys separate from your databases.
enables you to centrally manage encryption keys for Linux disk partitions.
offers comprehensive cloud key lifecycle management
The CipherTrust KMIP Server supports interoperability with a broad range of KMIP compatible devices and environments, which need to comply with data security regulations and industry standard best practices. Environments include storage arrays, hyper-converged infrastructure stacks, VMware environments, MySQL databases, tape drives and many others.
Public Cloud Native Encryption Services
Cloud provider implements proprietary encryption and controls keys
Public Cloud Services with BYOK, HYOK
Cloud provider implements proprietary encryption; customer controls keys
Bring Your Own Encryption with Centralized Key Management
Customer controls keys implements encryption common across clouds
Granular access control policies, Privileged user access controls and files, volumes and AWS S3
Access data during encryption and rekeying with Live Data Transformation and multicloud data mobility
Centralized key and encryption policy management across multiple clouds
Transparent Encryption for IaaS and Tokenization and app-layer encryption for PaaS
Do It Yourself-Bring Your Own Key
Cloud Key Life Cycle Management
CipherTrust Cloud Key Manager can automatically rotate a key prior to its defined expiration date
CipherTrust Cloud Key Manager can destroy both cloud-native and BYOK keys to:
Discover Protect Control
See how Thales CipherTrust Data Security Platform can help your organization secure sensitive data.
IDC Spotlight Report
451 Research Report
CipherTrust Data Security Platform - Product Brief
Top 10 Reasons for Protecting Your Organization with CipherTrust Data Security Platform
CipherTrust Data Security Platform - Data Sheet
Go Landscape for better mobile experience