Gemalto is now part of the Thales Group, find out more.
연락처

HSM On Demand for PKI Private Key Protection

HSM On Demand for PKI PrivateKey Protection

Secure private keys belonging to Certificate Authorities responsible for establishing PKI trust hierarchy.

Establish trust hierarchy by protecting your private keys, stored and used within the confines of your dedicated, cloud-based HSM service

In a public key infrastructure (PKI), PKI root keys are the private keys belonging to the Certificate Authority (CA) responsible for establishing the PKI trust hierarchy. Root Certificate Authorities are the anchor of trust in PKI deployments and compromise of the CA keys would compromise the entire PKI trust hierarchy (i.e. Root CA signs the Sub-CA certificates which are used in turn to sign user and device certificates), leaving your data at risk and vulnerable to un-authorized access. Using PKI Private Key Protection establishes trust by protecting your private keys, which are generated, stored and used within the confines of your dedicated HSM service for the highest security.

Key Features

  • Flexible partition policies to meet your key management and compliance needs
  • Secure audit logging
  • High-assurance delivery with secure transport mode
  • PKI-authenticated software updates

Benefits

  • Remotely manage HSMs - no need to travel
  • Reduced audit and compliance costs and burdens
  • Scalable to meet your cryptographic performance requirements
  • Peace of mind that your private keys are held in the utmost security
 
SafeNet Data Protection On Demand Services Solution Brief

SafeNet Data Protection On Demand Services Solution Brief

With SafeNet Data Protection On Demand, security is made simpler.

View the Solution Brief

Start Using SafeNet Data Protection On Demand

Sign Up Now