Company

Centrify and Gemalto Protect the Most Valuable Data for the Modern Enterprise

Together, we’re better. Centrify has teamed up with Gemalto to unlock the synergies of both companies’ solutions and protect the most valuable data assets and intellectual property of modern enterprises

COMBINING KEY MANAGEMENT TECHNOLOGY AND ZERO TRUST PRIVILEGE

gemalto

For over 25 years, Fortune 500 global corporations and government agencies have turned to Gemalto SafeNet to secure and protect their most valuable data assets and intellectual property. Gemalto SafeNet’s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud.

More than 25,000 customers across commercial enterprises and government agencies trust Gemalto SafeNet to protect and control access to sensitive data, manage risk, ensure compliance and secure virtual and cloud environments.

Centrify Zero Trust Privilege Services support the Gemalto SafeNet KeySecure key management appliances for encrypted storage of account passwords on-premises.

Customers have the option of using either Centrify’s secure storage in the cloud, or a key management appliance on-premises (or in the cloud) for encrypting and storing account passwords. With the key management appliance option, account passwords are encrypted and stored by the appliance; there is no copy of the password stored in the cloud.

Centrify Zero Trust Privilege Services support all Gemalto SafeNet KeySecure models; specifically, the K460 (with built-in HSM), K450, and K250 hardware models; and, Virtual KeySecure, available from leading cloud IaaS providers.

Benefits for Joint Customers

By leveraging Centrify Zero Trust Privilege Services, Gemalto SafeNet customers can:

  • Offload and accelerate cryptographic operations to a dedicated cryptographic processor that eliminates bottlenecks and maximizes application performance.
  • Centralize life cycle management of cryptographic keys — from generation, distribution, rotation, storage, termination and archival — in a purpose-built, highly secure appliance.
  • Improve profitability and achieve compliance with solutions for paper-to-digital initiatives, PCI DSS, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption and more.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial