Thales

CipherTrust Data Security Platform

Discover, protect and control sensitive data anywhere with next-generation unified data protection

Discover

Protect

Control

discover icon protect icon control icon

Why Choose CipherTrust Data Security Platform?

Simplify Data Security Icon

Simplfy Data Security

Accelerate Time to Compliance Icon

Accelerate Time to Compliance

Secure Cloud Migration Icon

Secure Cloud Migration

ciphertrust manager diagram

CipherTrust Data Security Platform Demo - Home

CipherTrust Data Security Platform Management Console

CipherTrust Manager is the central management point for the CipherTrust Data Security Platform. It provides a unified management console to discover, protect and control sensitive data anywhere across on-premises data stores and multi-cloud deployments.

CipherTrust Manager - Centralized Access Policy and Key Management

Key Management Icon

Key Management

Access Policies Icon

Access Policies

Auditing Reporting Icon

Auditing Reporting

Flexible APIs Icon

Flexible
APIs

FIPS Icon

FIPS 140-2 Compliant

CipherTrust Manager Icon

CipherTrust Manager

  • Centrally manage keys with role-based access policies
  • Enhanced auditing and reporting with multiple log formats and customizable alerts
  • Flexible APIs to automate administrative functions and allow programmatic encryption
  • Multi-tenant with strong separation of duties
  • Available in both virtual and physical form-factors, with FIPS 140-2 level 3 compliant HSM options

CipherTrust Manager - Domains

CipherTrust Manager - Hardware Security Modules (HSM)

CipherTrust Manager - Keys

CipherTrust Manager - API playground

Data Discovery is the First Step in Effective Data Security

data discovery icon

Data Discovery

Identify structured and unstructured data that is of risk of exposure, such as PII, PHI, PCI, IP, among other business data

data classification icon

Data Classification

Comply with industry-specific regulatory mandates such as CCPA, HIPAA, PCI DSS, and GDPR

risk analysis icon

Risk Analysis

Provide visibility into potential risks that may affect sensitive business information assets, data and processes

CipherTrust Data Discovery and Classification

DDC wheel new
data discovery icon

Find any type of sensitive data, anywhere

  • Automatically discover and classify data
  • Find structured and unstructured data anywhere
regulation icon

Regulation and Risk Analysis

  • Built in templates for Privacy, PCI, Health, etc.
  • Find and rank the data at risk with detailed reports and categorization
smarter targeted security icon

Smarter targeted security

  • Intelligent remediation based on data visibility, risks and policies
  • Integrated remediation for reduced risks

Data Discovery and Classification

Set policies, discover and classify data, rank risks and apply remediation.

  1. Policy
  2. Discovery
  3. Classification
  4. Risk Analysis
  5. Reports and Dashboard
  6. Remediation
add data store
add classification
add scan 2
add scan
sensitivity level
classification
risk analysis
risk analysis
add data store
add scan

Data Encryption Provides Full Protection and Control

data encryption icon

Data Encryption

Enforce encryption or tokenization to protect against unauthorized access by users and processes

access controls icon

Access Controls

Apply granular, least-privileged user access policies to protect data from external attacks and misuse by privileged users

security Intelligence icon

Security Intelligence

Identify and stop threats faster with detailed data access audit logs that satisfy compliance requirements and enables security analytics

CipherTrust Transparent Encryption

ciphertrust transparent encryption
transparent file-level encryption icon

Transparent, file-level encryption

For all databases and file types

privileged user access controls icon

Privileged user access controls

Allows root users to do their job, without abusing data

datat access audit logging icon

Data access audit logging

Accelerate threat detection and ease forensics

centralized encryption icon

Centralized encryption key and data access policy management

Streamline operations, reduce risk, satisfy compliance

CipherTrust Transparent Encryption

  1. Encryption Keys
  2. Policy Elements
  3. Users
  4. Policies
  5. Guardpoints
  6. Elevated privileges denied
  7. Permitted User
  8. Other Data Access Types
  9. Logging and Analysis
add data store
add data store
add data store
add data store
add data store
add data store
add data store
add data store
add data store

Control Data Access And Centralize Key Management

Centralize Control icon

Centralize Control

Centralized key management across multiple cloud infrastructures and SaaS applications

Separation of Duties icon

Separation of Duties

Separate keys from data, keep secure, and enforce administrative separation of duties

Lifecycle Management icon

Lifecycle Management

Automated key rotation and data rekeying services for enhanced data security

CipherTrust Enterprise Key Management

enterprise key management

CipherTrust KMIP server

provides centralized key management for KMIP-compliant devices such as SAN and NAS storage arrays, self-encrypting drives, and hyper-converged infrastructure

CipherTrust TDE Key Management

simplifies key management across Oracle TDE and Microsoft SQL Database Server, and keep the TDE keys separate from your databases.

CipherTrust LUKS Key Management

enables you to centrally manage encryption keys for Linux disk partitions.

CipherTrust Cloud Key Manager

offers comprehensive cloud key lifecycle management

Key Management Interoperability Protocol Server - KMIP Server

Shared Responsibility Model for Cloud Data Security

Customer Responsibility

Provider Responsibility

Hierarchy of Cloud Data Security and Control

up arrowdata-auditability

Public Cloud Native Encryption Services


CLOUD PROVIDER CONTROL

Cloud provider implements proprietary encryption and controls keys

Public Cloud Services with BYOK, HYOK


PARTIAL CUSTOMER CONTROL

Cloud provider implements proprietary encryption; customer controls keys

Bring Your Own Encryption with Centralized Key Management


FULL CUSTOMER CONTROL

Customer controls keys implements encryption common across clouds

right arrow

Customer Control

Bring Your Own Encryption Benefits

data encryption icon

Enhanced Security

Granular access control policies, Privileged user access controls and files, volumes and AWS S3

access controls icon

Enhanced Availability

Access data during encryption and rekeying with Live Data Transformation and multicloud data mobility

data encryption icon

Enhanced Control

Centralized key and encryption policy management across multiple clouds

access controls icon

Enhanced Flexibility

Transparent Encryption for IaaS and Tokenization and app-layer encryption for PaaS

Cloud Bring Your Own Key Choices

Do It Yourself-Bring Your Own Key

access controls icon

Cloud Key Life Cycle Management

access controls icon

CipherTrust Cloud Key Manager

ciphertrust cloud key manager
transparent file-level encryption icon

Cloud Bring Your Own Key with Enhanced Security Team Efficiency

privileged user access controls icon

Centralized, multicloud key life cycle management for IaaS, PaaS and SaaS

datat access audit logging icon

Strong Encryption Key Security and Control

centralized encryption icon

The Compliance Tools You Need

Full Cloud Key Lifecycle Management

  1. Create
  2. Backup
  3. Deploy
  4. Monitor
  5. Rotate
  6. Expire
  7. Archive/ Suspend
  8. Destroy
add key
  • For clouds that provide backup keys, CipherTrust Cloud Key Manager retains them in a secure store
  • For other clouds, CipherTrust Cloud Key Manager retains the original key as a backup
upload key
risk analysis
add data store

CipherTrust Cloud Key Manager can automatically rotate a key prior to its defined expiration date

delete key

CipherTrust Cloud Key Manager can destroy both cloud-native and BYOK keys to:

  • Prevent future use
  • Logically erase encrypted data

Learn more

Choose your free assets

CipherTrust Data Security Platform

Discover Protect Control

infinity loop

See how Thales CipherTrust Data Security Platform can help your organization secure sensitive data.

Contact us

IDC Spotlight Report

451 Research Report

CipherTrust Data Security Platform - Product Brief

Top 10 Reasons for Protecting Your Organization with CipherTrust Data Security Platform

CipherTrust Data Security Platform - Data Sheet

Go Landscape for better mobile experience