Gemalto's Solution for Enterprise Security
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
With Gemalto Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon. Not only can they create trust and authenticity in their transactions, but they can ensure that sensitive data is protected and controlled — both on-premises, and in public and private clouds. In addition to a heightented level of protection, enterprises are also able to improve business efficiencies and scale to the identity and data protection needs of tomorrow.
Identity And Access Management
Enable secure access to online resources and protect digital interactions with market-leading strong authentication and digital signing solutions.
Protect your enterprise's sensitive data wherever it resides or is transmitted with data-at-rest and data-in-motion encryption solutions.
Secure your cryptographic keys with enterprise key management, centralized crypto resource management, and the use of a hardware root of trust.
Maximize security and control in the cloud, migrate to new services with optimal flexibility, and fully leverage the cloud's business agility.
Identity and Access Management:
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices by enabling secure access to online resources and protecting the digital interactions of employees, partners, and customers with market-leading strong authentication and digital signing products.
Offering fully automated cloud-based authentication and extensive lifecycle management, Gemalto's authentication management platforms are designed to streamline deployment in complex environments, reduce administration overheads and offer a solid foundation to scale in both cloud and on-premises PKI environments.
Whether located in the cloud, the corporate data center, or virtual environments, Gemalto's broad range of authentication methods and form factors allow enterprises to secure access to any application from any device.
Gemalto's identity and access management products utilize strong authentication to enable enterprises and trust centers to secure access, identities, and interactions. Our solutions include cloud-based or server-based management platforms, advanced development tools, and the broadest range of authenticators.
SafeNet Authentication Service (SAS) delivers fully automated strong authentication from the cloud, enabling organization to protect cloud-based and on-premises applications, from any device with user-friendly token options.
Authentication Management Platforms
Gemalto's enterprise-grade authentication management platform enables secure access, network access, and PKI digital signing as well as extensive certificate lifecycle management.
Gemalto Bluetooth Smart technology enables connectivity with PKI security integrating desktops and mobile devices, anytime, anywhere.
Generate dynamic one-time passwords (OTPs) for authenticating users to critical applications wherever they reside, from any device.
Gemalto's OOB authenticators utilize external channels such as SMS or email to send dynamic passwords to users.
Pattern-based authentication allows end-users to generate a one-time password by entering numbers that correspond to a pre-defined pattern on the screen.
PKI Smart Cards
Strong, yet simple, Gemalto smart cards offer s trong multi-factor authentication in a traditional credit card form factor and enable organizations to address PKI security needs ranging from remote access, network access, password management, network logon, corporate badging to digital signing and secure transactions.
Remote Access Solutions
Gemalto's suite of SafeNet Authentication Solutions allow effective secure remote access to a company's sensitive resources.
Gemalto middleware enables strong authentication operations and the implementation of certificate-based applications such as digital signing, data protection, network logon and password management.
Smart Card Readers
IDBridge smart card readers offer the perfect balance of ease of use and solid security for communication between smart cards and network services.
Software and Mobile Authenticators
Gemalto's mobile authenticators eliminate the need for a separate authentication device by turning mobile phones and tablets into your second factor of authentication.
USB PKI Tokens
Gemalto USB tokens utilize PKI technology to generate and store credentials, such as private keys, passwords and digital certificates inside the protected environment of the smart card chip stored on a trusted USB device.
Why Choose Gemalto IAM Solutions
SafeNet identity and access management solutions allow organizations to use strong authentication anywhere a password is currently used. With support for RADIUS, SAML 2.0, APIs and dedicated agents, SafeNet Authentication Service (SAS) has the flexibility and scalability to protect your entire IT ecosystem, including:
- SaaS, Idaas and Ipaas applications
- Virtualized environments (VDI)
- Web portals and cloud-based applications
- Local networks
- Physical and logical access
Enterprise Encryption Solutions:
To reduce the risk posed by hackers, insider threats, and other malicious attacks, your organization must utilize encryption to protect sensitive data wherever it is found across your on-premises, virtual, public cloud, and hybrid environments. This includes data at rest in application and web servers, file servers, databases, and network attached storage, as well as data in motion across your network.
Data-at-Rest and Data-in-Motion Encryption
As your corporate data assets grow, data-at-rest encryption is a critical last line of defense. Encryption applies security and access controls directly to your sensitive structured and unstructured data - wherever it resides.
In addition to protecting data at rest, enterprises must also address threats to sensitive data as it traverses networks. Data-in-motion encryption ensures your data, video, voice and even metadata is protected from eavesdropping, surveillance, and overt and covert interception. With Gemalto's comprehensive portfolio of SafeNet data-at-rest and data-in-motion encryption solutions, you can secure all types of sensitive data across today's distributed enterprise.
SafeNet Data-at-Rest Encryption Solutions
Gemalto's portfolio of data-at-rest encryption solutions delivers transparent, efficient, and unmatched data protection at all levels of the enterprise data stack, including the application, database (column or file), file system, full disk (virtual machine), and network attached storage levels. In addition to working across on-premises, virtual, and cloud environments, these solutions are deployed with the SafeNet KeySecure enterprise key manager for centralized key and policy management.
SafeNet Data-in-Motion Solutions
A powerful safeguard for data in motion, SafeNet High Speed Encryptors deliver proven and certified Layer 2 encryption capabilities that meet secure network performance demands for real time, low latency and near zero overhead to provide security without compromise.
Reduce Risk and Meet Your Business Needs with Gemalto's Enterprise Encryption Solutions
Without a comprehensive data protection platform that includes strong encryption to secure and control access to your high-value information, and centralized enterprise key management to secure, manage, and prove ownership of your keys, your sensitive data is at risk. Gemalto's encryption solutions enable your organization to meet your immediate data protection and business needs now, while investing in a platform that provides robust security, a growing ecosystem, and the scalability you need to build a trusted framework for the future.
With Gemalto's encryption solutions, you can meet a wide variety of use cases, including:
- Addressing compliance and regulatory mandates
- Protecting personally identifiable information (PII) or protected health information (PHI)
- Protecting intellectual property
- Securing big data frameworks and implementations
- Securing data, voice, video, and metadata in motion
- Deploying encryption centrally "as a service" across the enterprise
- Ensuring secure migration to the cloud
Crypto Management Solutions:
When encryption is used, the risk is transferred from the data itself to the cryptographic keys. The ability to securely manage, store, and use keys is essential. With a copy of the private key an attacker could decrypt data, create fraudulent identities, and generate certificates at will.
Deploying a high-assurance crypto management platform is the best way to protect your cryptographic keys. This approach is built on a foundation of strong keys, enterprise key management, centralized crypto resource management, and the use of a hardware root of trust.
Why Use Gemalto for Crypto Management?
Gemalto delivers the breadth of solutions that enable security teams to centrally employ defense-in-depth strategies—and ultimately make sure encryption yields true security.
SafeNet Hardware Security Modules
SafeNet Hardware Security Modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services.
With SafeNet KeySecure, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise—in the cloud or on-premises.
SafeNet Crypto Command Center
Virtually managing HSMs is now not only possible, but easy for administrators. With SafeNet Crypto Command Center, organizations can quickly and securely provision SafeNet HSM crypto resources and reduce IT infrastructure costs.
Cloud Security Solutions for Enterprises:
To fully capitalize on the strategic potential of the cloud, you need to know that your data is secure, wherever it resides. By addressing cloud security challenges such as data control, accessibility, and visibility, you can ensure that you are the only one who controls access and the keys to your data – especially across multitenant, geographically distributed sites.
Whether it's a public, private, hybrid cloud, or virtualized data center, Gemalto offers the most comprehensive, flexible, and modular identity and data protection solutions – ensuring enterprises have confidentiality and integrity of cloud data and business processes.
Maximize security and control in the cloud, migrate to new services with optimal flexibility, and fully leverage the cloud's business agility with Gemalto Cloud Security Solutions for Business. Trust your sensitive data to the cloud, secure in the knowledge that it is protected.
Secure Migration to the Cloud and Virtual Data Centers
Maintain ownership and control of your sensitive information, manage privileged user access and safeguard against the damage of exposure of data as you migrate to virtual data centers or multitenant public cloud environments.
Secure Encryption for Sensitive Data in the Cloud
Ensure transparent, efficient, and unmatched data protection with Gemalto's portfolio of encryption solutions - securing sensitive data in databases, applications, file servers, virtual instances and machines, and storage in your virtual, public cloud, and hybrid environments.
Cloud Access Control Center
Seamlessly extend secure access to the cloud through identity federation, leveraging existing authentication infrastructures to extend users' identities to the cloud, enabling unified access control policies for both cloud and network applications.
Secure Cryptographic Keys in the Cloud
Deliver on-demand, elastic crypto services for data protection via cloud environments. Manage crypto and encryption services, including storage of cryptographic keys and centralized key and policy management simply, efficiently and securely.
Secure Data in Motion in the Cloud
Safeguard data in motion with high speed Layer 2 encryption designed to meet network performance demands for real-time low latency and near-zero overhead to provide security without compromise for data traversing the cloud.
SafeNet brand update:
On January 8, 2015, SafeNet became part of Gemalto with the aim to become the world's leading vendor of solutions for protecting data, transactions, and identities as well as monetizing software. SafeNet is firmly integrated into the wider product Gemalto portfolio and its solutions for Enterprise Security and Software Monetization are now at the heart of our vision to bring trust to an increasingly connected world.
The Gemalto brand has evolved to include the SafeNet portfolio and has resulted in some important changes to the former SafeNet corporate branding. In brief, this means that the SafeNet name will now refer to a product offer while Gemalto will be used as the company brand. The most visible impact for you will be a phase out of the SafeNet company logo although the SafeNet and Sentinel names will still be used for our products.
For existing SafeNet customers and partners, this means that the brand logo on all legal documents and correspondence will be replaced with Gemalto. However, as there are no changes to the SafeNet legal entities at this time, there should be no action on your part to change the legal entity name used within accounting and legal documents.
Below are some frequently asked questions we wanted to address as part of the SafeNet business and brand integration into Gemalto.
Frequently Asked Questions
Q: As a SafeNet customer or partner, is there anything I need to do differently?
A: There is no action required on your behalf at this time. This is simply a notice to you to explain the change in the appearance of correspondence we send to you. Please ensure all new orders continue to reference the SafeNet entity you have used in the past.
Q: What happens if I use the Gemalto name after December 8, 2015?
A: Orders should continue to reference the appropriate SafeNet entity. Orders submitted using any Gemalto name cannot be accepted. This may cause a delay in your order processing and fulfillment.
Q: Does this affect products or services?
A: No. This change only affects the company brand displayed on all business documents and correspondence. All products and product numbers will stay the same and will be rebranded over time.
Q: Will Gemalto continue offering all SafeNet products?
A: Over the last few months, Gemalto and SafeNet have reviewed the product portfolio to see which product areas they wanted to invest more in and where there are opportunities for operational efficiencies. The following product categories are ones that Gemalto is expanding investment in:
- Crypto Management - Hardware Security Modules (HSM)
- Identity Protection portfolio
- Encryption – Connectors
- Sentinel Software Monetization solutions
Q: Who should I contact if I would like to order SafeNet products?
A: You should contact your local sales manager that you have been working with to this point.
Q: Are any product names being changed?
A: All existing product names remain the same. Moving forward, with new product releases, we will be changing the names of some SafeNet/Gemalto product family names as outlined in the SafeNet product renaming document. These will be communicated as part of future product releases. However, the Ezio product family names and those of the Sentinel Software Monetization products are not planned to change in the near future.
Q: How will our social media accounts be rebranded?
A: The SafeNet social media properties (Twitter, Facebook, LinkedIn etc.) will be rebranded to Gemalto. This will apply to the former corporate accounts and the Identity and Data Protection social media properties. For example, for Twitter @SafeNetInc has already been rebranded to @GemaltoSecurity and @SafeNetUK to @GemaltoUK. The other networks will be rebranded in early 2016. The SafeNet Art of Data Protection blog will also transition to the Gemalto blog.
The Software Monetization social accounts will not change. We will continue to use the LicensingLive! name as it covers the event and the global software licensing market. The related social media properties will therefore not be rebranded.
Q: Who should I contact if I have questions?
A: You can contact your SafeNet regional sales manager or Channel Manager, or you can contact SafeNet Customer Service for additional information using the following email addresses:
- Americas Customers - CustomerService-Americas@Safenet-inc.com
- Asia Pacific Customers - CustomerService-APAC@Safenet-inc.com
- Europe and Middle East Customers - Eorders-emea@Safenet-inc.com
- Pricing and product availability subject to change without notice.