Centrify and Gemalto Protect the Most Valuable Data for the Modern Enterprise

Combining Key Management Technology and Centrify PAM

Together, we’re better. Centrify has teamed up with Gemalto to unlock the synergies of both companies’ solutions and protect the most valuable data assets and intellectual property of modern enterprises.

For over 25 years, Fortune 500 global corporations and government agencies have turned to Gemalto SafeNet to secure and protect their most valuable data assets and intellectual property. Gemalto SafeNet’s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud.

More than 25,000 customers across commercial enterprises and government agencies trust Gemalto SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

Centrify Privileged Access Management (PAM), founded on Zero Trust principles, supports the Gemalto SafeNet KeySecure key management appliances for encrypted storage of account passwords on-premises.

Customers have the option of using either Centrify’s secure storage in the cloud, or a key management appliance on-premises (or in the cloud) for encrypting and storing account passwords. With the key management appliance option, account passwords are encrypted and stored by the appliance; there is no copy of the password stored in the cloud.

Centrify modern PAM supports all Gemalto SafeNet KeySecure models; specifically, the K460 (with built-in HSM), K450, and K250 hardware models; and Virtual KeySecure, available from leading cloud IaaS providers.

Benefits for Joint Customers

By leveraging Centrify PAM, Gemalto SafeNet customers can:

  • Offload and accelerate cryptographic operations to a dedicated cryptographic processor that eliminates bottlenecks and maximizes application performance.
  • Centralize life cycle management of cryptographic keys — from generation, distribution, rotation, storage, termination, and archival — in a purpose-built, highly secure appliance.
  • Improve profitability and achieve compliance with solutions for paper-to-digital initiatives, PCI DSS, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us