CipherTrust Data Security Platform Ds
CipherTrust Data Security Platform Ds
CipherTrust Data
Security Platform
Thales offers a unified
approach to data security
cpl.thalesgroup.com
CipherTrust Data Security Platform
You can discover, protect and control your organization’s sensitive • Secrets management
data to avoid the security breaches that are happening with alarming ° Centralized management for all types of secrets
regularity. The CipherTrust Data Security Platform from Thales enables
you to protect your data and meet the data protection compliance ° Built for ease of use in DevOps integrations, automations,
and orchestrations
mandates that are becoming more stringent. To stay a step ahead of
dynamic cybersecurity threats, your organization needs to extend data ° Manage secrets for hybrid, multi-cloud (all clouds), multi-
protection across more environments, systems, applications, processes tenants, on-prem and legacy systems and with human or
and users with a data-centric solution. A data-centric solution secures machine access
data as it moves from networks to applications and the cloud, and • Data protection techniques
decreases the number of resources required to maintain strong data
° Transparent encryption for files, databases and big data
security.
° Application-layer data protection
The CipherTrust Data Security Platform (CDSP) significantly ° Format-preserving encryption
reduces risk across your business. CDSP integrates centralized key
° Tokenization with dynamic data masking
management with data discovery, classification, data protection
and granular access controls. CDSP decreases resources required ° Static data masking
for data security operations and compliance controls by simplifying ° Privileged user access controls
data security, accelerating time to compliance, and securing cloud • Centralized enterprise key management
migration.
° FIPS 140-2 compliant enterprise key management
The CDSP platform offers capabilities for discovering, protecting and ° Unparalleled partner ecosystem of KMIP integrations
controlling access to databases and files—and can secure assets ° Multi-cloud key management
residing in cloud, virtual, and physical environments. This scalable,
° Transparent Data Encryption (TDE) key management
efficient data security platform enables you to address your urgent
requirements and prepares your organization to respond nimbly when
the next security challenge or compliance requirement arises. Environments
• Clouds: Amazon Web Services, Google Cloud Platform, IBM
Cloud, Microsoft Azure, Oracle Cloud Infrastructure, Salesforce,
Capabilities SAP, and more
• Centralized management console • Supported OSs: Linux, Windows and Unix
• Monitoring and reporting • Big Data: Hadoop, SAP HANA
• Data discovery and classification • Database: IBM DB2, Microsoft SQL Server, MongoDB, MySQL,
° Risk analysis with data visualization Oracle, Sybase, Teradata and others
• Data discovery and classification can be combined with • Any storage environment
transparent encryption to automatically encrypt sensitive data at the
file level
Platform advantages
• Ransomware protection
• Discover, protect and control your organization’s sensitive data
° Actively watches for malicious behavior anywhere with next-generation unified data protection
° Behavior monitoring and data analytics enable: • Consistent security and compliance across physical, virtual, and
° Protection against zero-day attacks cloud environments
° Protection when system is disconnected from the internet • Identify and secure data across structured, unstructured and big
° Protection when installed after the existence of ransomware data platforms
on the endpoint
• Reduce time-to-value. Rapidly enable platform capabilities as
needed
• Hardware Security Modules as the secure root of trust for the
platform include FIPS 140-2 Level 3 certification
Key benefits CipherTrust Enterprise Key Management manages encryption keys
for many sources and environments across the enterprise, simplifying
Simplify Data Security. Discover, protect, and control sensitive data encryption key management across storage, databases and clouds.
anywhere with next-generation unified data protection. The CipherTrust The CipherTrust KMIP Server operates on CipherTrust Manager to
Data Security Platform (CDSP) simplifies data security administration centralize key management for many KMIP clients and partner-
with a centralized management console that equips organizations verified solutions. CipherTrust Application Key Management (CAKM)
with powerful tools to discover and classify sensitive data, combat is available for Oracle TDE and Microsoft SQL Server EKM.
external threats, guard against insider abuse, and establish persistent CipherTrust Cloud Key Management (CCKM) streamlines Native key
controls for on-prem and cloud-based data. Organizations can management, Bring Your Own Key” (BYOK) and “Hold Your Own
easily uncover and close privacy gaps, prioritize protection, and Key” (HYOK) for Amazon Web Services (AWS), Google Cloud
make informed decisions about privacy and security mandates before Platform (GCP), Microsoft Azure1, Oracle Cloud Infrastructure (OCI)1,
starting or advancing a digital transformation to fundamentally change Salesforce and SAP1.
how the organization operates and delivers value to customers.
Data-at-Rest Encryption protects data without requiring any changes
Accelerate Time to Compliance. Regulators and auditors to business or data management processes. CipherTrust Transparent
require organizations to have control of regulated and sensitive Encryption (CTE) encrypts data across environments and platforms
data along with the reports to prove it. CDSP supports pervasive (on-premises, cloud, database and big data platforms) with
data security and privacy requirements such as data discovery and comprehensive data access controls that can stop even the most
classification, encryption, access control, audit logs, tokenization, damaging attacks. CTE provides a single pane of glass view and
and key management. Data security controls can be added to new consistent configuration across guardpoints. Extensions such as Live
deployments or in response to evolving compliance requirements. The Data Transformation enable zero-downtime data encryption and key
centralized and extensible nature of the platform enables new controls rotation.
to be added quickly through the addition of licenses and scripted
The CipherTrust Data Security Platform offers a range of products
deployment.
with developer-friendly application programming interfaces for
Secure Cloud Migration. The CipherTrust Data Security Platform Key Management, Encryption and Tokenization. CipherTrust
offers advanced encryption and centralized key management Application Data Protection provides server- or RESTful API-based
solutions that enable organizations to safely store sensitive data in key management and encryption services. CipherTrust Tokenization
the cloud. The platform offers advanced multi-cloud Bring Your Own solutions include both Vaultless Tokenization with Dynamic Data
Encryption (BYOE) solutions to avoid vendor lock-in and ensure Masking and Vaulted Tokenization based on use-case requirements.
the data mobility to efficiently secure data across multiple cloud
CipherTrust Database Protection (CDP) solutions provide database
vendors with centralized cloud-agnostic encryption key management.
column-level encryption without the need for software engineering
Organizations that cannot bring their own encryption can still follow
assistance. CDP solutions deliver the highest level of separation of
industry best practices by managing keys externally using CipherTrust.
duties for access to sensitive data.
Cloud Key Management (CCKM). CCKM supports Bring Your
Own Key (BYOK) and Hold Your Own Key (HYOK) use-cases across
multiple cloud infrastructures and SaaS applications. CCKM provides
a single pane of glass view for each of the public clouds, showing all
regions in a single pane of glass and removing the need for SMEs
DISCOVER
to become experts in every cloud system.With the CipherTrust Data
Security Platform, the strongest safeguards protect an enterprise’s
sensitive data and applications in the cloud, helping the organization ata Sec
plify D
Discovery & Data-at-rest
urit
meet compliance requirements and gain greater control over their Classification Sim y Encryption
data, wherever it is created, used or stored.
FIP
e
Featured products:
ieve Complianc
PROTECT
S 14
MONITOR
0-2 Certifie
CipherTrust Manager (CM) is the central management point for the CipherTrust
CDSP platform, providing data access and key policy management. Manager
Ach
1 Check with us for dates for HYOK support for this cloud.
CipherTrust Manager
Overview
Key benefits
At the center of the CipherTrust Data Security Platform (CDSP) is
• Centralized key management allows consolidation of
CipherTrust Manager. CipherTrust Manager (CM) centralizes keys,
on-prem and cloud encryption keys across multiple
management and policies for all of the CDSP Connectors:
applications, data stores, and appliances
• Data Discovery and Classification • Provides the foundation for the Ciphertrust Data Security
• Enterprise Key Management Platform, enabling customers to reduce business risk with
data discovery, classification and protection of sensitive data
• Cloud Key Management
• Simplifies management with a self-service licensing portal
• Transparent Encryption and visibility into licenses available and in use
• Live Data Transformation • Cloud-friendly deployment options with support for Alibaba
• Application Data Protection Cloud, AWS, Azure, Google Cloud, OpenStack, Oracle
Cloud, VMware and more
• Database Protection.
• Superior key control and generation via Hardware Security
Built on an extensible microservices architecture, CM enables Module (HSM) integrations
organizations to efficiently address privacy and data protection
• Extensible microservices architecture enabling maintenance
regulatory mandates and adapt readily as encryption and IT
and upgrades without downtime
requirements evolve.
• Unparalleled partner ecosystem of integrations with leading
CM simplifies key lifecycle management including key generation, enterprise storage, server, database, application and cloud
backup and restore, deactivation and deletion. Core features of CM: vendors
role-based access to keys and policies, multi-tenancy
support, robust auditing and reporting of both key usage and
operational changes.
CM is available in both virtual and physical appliance form factors Key features
to address varying deployment use cases from public and private • Full Key Lifecycle Management, including secure key
clouds to on-prem secure deployment with physical security controls. generation, rotation, deactivation, deletion, and backup/
Hardware and virtual appliances can leverage embedded Luna restore
Network HSMs or select cloud HSMs to enable FIPs 140-2 Level 3
• Centralized administration, unifying key management
highest level root of trust.
operations with role-based access control and full audit
Active/Active clustering for the highest availability can be configured log review
with a mix of hardware and virtual appliances. Active/Active • Self-service licensing, streamlining Connector license
clustering provides customers with high-assurance deployments provisioning and ongoing management
ensuring 24x7 uptime to support key management and data
• Secrets management, providing the ability to create and
encryption requirements.
manage secret and opaque objects for use on the platform
• Multi-tenancy provides capabilities required to create
multiple domains with separation of duties to support large
enterprise environments
• REST APIs to automate repetitive management and
encryption tasks
• Flexible HA clustering and intelligent key sharing, offering
clustering physical and/or virtual appliances
• Robust auditing and reporting, including tracking key
CipherTrust Manager
state changes, administrator access, and policy changes
in multiple log formats (RFC-5424, CEF, LEEF) for easy
App
Servers/
Containers
Unified management and administration For CipherTrust Manager Features, Appliance Specifications,
Safety Certifications and Emissions Certifications, please refer to
across the hybrid enterprise the CipherTrust Manager Product Brief.
CTE-RWP continuously enforces ransomware protection enabled • Easy-to-deploy protection with minimal configuration, no
per disk volume with minimal configuration and no modification to modification to applications on the endpoint and no setup of
any applications on the endpoint/server. It continuously monitors access controls or encryption policies
abnormal file activity caused by ransomware-infected processes,
and alerts/blocks when abnormal file activity is detected. Key features
• Monitors abnormal I/O activity caused by ransomware-
Easy to Deploy infected processes and alerts/blocks the malicious activity
when detected
CTE-RWP enables administrators to configure ransomware protection
without setting up CTE restrictive access control and encryption • No depencencies on malware signature databases
policies on a per file/folder basis. • Enabled per disk volume; monitors both local and cloud
(SMB/CIFS shares) volumes
Robust Ransomware Detection • A trusted list for permitted processes can be set up to avoid
unwanted monitoring or blocking
CTE-RWP uses process-based machine learning models to
dynamically detect suspicious file I/O activity. It identifies and
alerts or blocks ransomware on endpoints/servers. A trusted list for Technical specifications
permitted processes can be set up to avoid unwanted monitoring • Requires CipherTrust Manager v2.12 and CipherTrust
or blocking. Transparent Encryption v7.4.0 and subsequent versions
• Windows platform (Linux on roadmap)
Managed in CipherTrust Manager • IP addresses, routing configurations, and DNS addresses
CTE-RWP can be licensed separately or in conjunction with CTE. must allow connectivity to CipherTrust Manager
When CTE-RWP is combined with a CTE license, administrators can • Communication between CipherTrust Manager and the CTE
additionally apply fine-grained access control and encryption. Agent defaults to port 443
Cyber Criminal
!
CTE-RWP
CipherTrust Manager
Technical specifications
Scalability for hybrid and multi-cloud
• SaaS secrets vault platform with gateway to CipherTrust
Moving to the cloud is often a protracted transition, resulting in hybrid Manager
environments, with some resources on premises, and others distributed
across multiple public and private clouds. CSM works in hybrid, multi- • Supports encryption keys, static secrets, rotated secrets, dynamic
cloud (all clouds), multi-tenant, on-prem and legacy systems and with secrets, SSH cert issuers, PKI cert issuers and certificates
human or machine access. • CipherTrust Manager’s encrypted customer fragment (an
AES256 key) of every secret is protected by the same root of
trust key hierarchy protecting all keys originating from CipherTrust
Manager. This is in addition to the benefits of Akeyless’
Distributed Fragments Cryptography™ (DFC) technology
• Interfaces include: Gateway configuration manager, gateway
console, REST APIs (v1 & v2), CLI
• Integration categories include: Browser Extensions, CI/
CD, Code Management, Configuration Management, Identity
Providers, Infra Automation, Kubernetes, Notification apps and SDKs
CipherTrust Data Discovery
and Classification
Data Discovery and Classification (DDC) locates regulated data, Single pane of glass for clear visibility
both structured and unstructured, across the cloud, big data, and
traditional data stores. A single pane of glass delivers understanding DDC provides a clear understanding of sensitive data, usage, and
of sensitive data and its risks, enabling better decisions about closing risks of exposure, from a single pane of glass. A centralized console
security gaps, prioritizing remediation, and securing your cloud with visualized data and aggregated reports enables informed
transformation. decisions about data sharing, digital transformation, and prioritizing
remediation.
Data Discovery and Classification provides a streamlined workflow
from policy configuration, discovery and classification, to risk
analysis and reporting, helping to eliminate security blind spots and Quick start with flexibility
complexities. Data Discovery and Classification provides a comprehensive set of
built-in classification templates for commonly requested data privacy
and security regulations, such as GDPR and CCPA, while easily
Enterprise-wide data privacy handling custom policies based on specific patterns, algorithms and
CipherTrust DDC delivers an enterprise-wide data privacy solution that more.
is simple to deploy and scale. It provides ready-to-use templates and
a streamlined workflow to help you quickly discover your regulated
data across traditional and modern repositories.
Aw
ar
ion
en
ess
Act
Remediation Policy
Detailed
Reports
Risk Discovery
analysis
Classification
Alert
Demonstrate compliance
CipherTrust Data Discovery and Classification provides detailed
Data Discovery and Classification
reports that can demonstrate compliance with various regulations and Technical specifications
laws. Efficient scans build a strong foundation for overall data privacy
and security to auditors. • Data Stores
• Local storage and local memory on the host
DDC is available in both agent-based and agentless deployment ° Windows Share (CIS/SMB)
modes. The choice enables security and IT teams to select deployment ° Unix File System (NFS)
modes for optimal results and efficient cost of ownership. • Databases
° IBM DB2
° Oracle
° SQL
Key benefits • Big Data
• Reduce complexity and risk with streamlined workflows ° Hadoop Clusters
unique to your organization
Type of files supported
• Privacy officers can rapidly uncover privacy gaps, prioritize
• Databases: Access, DBase, SQLite, MSSQL MDF & LDF
remediation, and proactively respond to regulatory and
business challenges from a single pane of glass • Images: BMP, FAX, GIF, JPG, PDF (embedded), PNG, TIF
• Build a strong foundation for overall data privacy and • Compressed: bzip2, Gzip (all types), TAR, Zip (all types)
security through effective scans that help discover both • Microsoft Backup Archive: Microsoft Binary/BKF
structured and unstructured data across a diverse set of data
stores • Microsoft Office: v5, 6, 95, 97, 2000, XP, 2003 onwards
• Ensure secure third-party data sharing by scanning for • Open Source: Star Office/Open Office
sensitive data and removing it, as needed, in advance • Open Standards: PDF, HTML, CSV, TXT
Pre-built templates
The solution includes a wide range of ready-to-use templates
that can help you meet common regulatory and business policy
needs:
• CCPA • GDPR
• HIPAA • PCI DSS
• PII • PHI
• Amplify the benefits of Cloud Native keys by using a robust Google Cloud Platform CMEK Native BYOK
multi-cloud platform with outstanding UI
Google Cloud Platform EKM HYOK
• Leverage the value of “Bring Your Own Key” and “Hold Your
Own Key” services with full lifecycle cloud encryption key Google Cloud Platform EKM UDE HYOK-
lifecycle management CC*
• Comply with the most stringent data protection mandates with Google Workspace CSE HYOK
secure key origination
Microsoft Azure Cloud Native BYOK
• Automated synchronization ensuring that cloud console operations Oracle Cloud Infrastructure Native BYOK HYOK
are centrally visible
Salesforce.com Native BYOK HYOK
• Automated key rotation with support for expiring keys which can **
save thousands of hours per year
Salesforce Sandbox Native BYOK HYOK
**
Encryption key security SAP Data Custodian Native BYOK
Customer key control requires secure key generation and storage.
Scalable encryption • Role-based access policies control who, what, and how
data can be accessed
CipherTrust Transparent Encryption runs at the file system or volume
level on a server, and is available for Microsoft Windows Server, • Enable privileged users to perform work without access to
many variants of Linux, and IBM AIX operating systems. It can be used clear-text data
in physical, virtual, cloud, and big data environments – regardless of
the underlying storage technology. Administrators perform all policy
and key administration through CipherTrust Manager.
IBM POWER.
Security best practices and regulatory mandates require periodic key CipherTrust Transparent Encryption
rotation. Live Data Transformation addresses these requirements with
speed and efficiency through online key rotation and data rekeying. for Teradata
CTE LDT provides resource management capabilities to balance CipherTrust Transparent Encryption for Teradata (CTE for Teradata)
between encryption and business demands. An administrator can is a high performance encryption solution for Teradata databases.
define a rule specifying that, during business hours, encryption can A CTE agent on the host allows root users to do their job, without
only consume 10% of system CPU, while on nights and weekends, abusing data by applying block-level encryption, access control and
encryption can consume 70% of CPU. Similar controls are available data audit logging. CipherTrust Manager manages CTE for Teradata
for I/O operations. and prevents unwanted processes from accessing the Teradata
database(s). CipherTrust Manager centralizes encryption key and
CTE LDT offers faster backup and archive recovery. In a data data access policy management.
recovery operation, archived encryption keys recovered from
CipherTrust Manager are automatically applied to an older data set.
Restored data is encrypted with the current cryptographic keys. CipherTrust Transparent Encryption for
UserSpace
CipherTrust Transparent Encryption for CTE UserSpace provides a robust and scalable file system level
encryption and access control solution for the variety of flavors of Linux
SAP HANA servers in the distributed enterprise without changes to infrastructure
CTE safeguards SAP HANA data enabling enterprises to meet or applications. Once CTE UserSpace is deployed, files containing
rigorous security, data governance, and compliance requirements. sensitive data are rendered useless in the event of a breach, misuse
The solution enforces strong data encryption on all SAP HANA data or hijacking of privileged accounts, physical theft of servers, and other
and log partitions and protects and controls access to the SAP HANA potential threats.
Persistence layer. The solution can be quickly deployed and requires
no changes to SAP HANA or the underlying database or hardware
infrastructure. Further, SAP has reviewed and qualified CipherTrust CipherTrust Transparent Encryption for
Transparent Encryption as a suitable solution for SAP HANA 2.0 Kubernetes
environments.
CTE for Kubernetes (CTE K8s) can apply data protection (including
encryption, user and process-based access controls, and data access
logging) on a per-container basis, both to data inside of containers
and to external persistent volume storage accessible from containers.
CipherTrust Tokenization
Tokenization reduces the cost and effort required to comply with
security policies and regulatory mandates such as the European Vaultless Tokenization
Union’s Global Data Protection Regulation (GDPR) and the Payment
Card Industry Data Security Standard (PCI-DSS). CipherTrust Technical specifications
Tokenization offers application-level tokenization services in two
convenient solutions that deliver complete customer flexibility: Vaultless Tokenization capabilities:
Tokenization with Dynamic Data Masking and Vaulted Tokenization. • Format-preserving tokens with irreversible option
Both solutions secure and anonymize sensitive assets—whether they
• Random tokens data length up to 128K
reside in the data center, big data environments or
the cloud. • Date tokenization
• Unicode UTF-8 character set support enable data
Vaultless Tokenization tokenization in almost any language
• Luhn checking option for FPE and random tokens
CipherTrust Vaultless Tokenization protects data at rest while its policy-
based Dynamic Data Masking capability protects data in use. A Dynamic data masking capabilities:
RESTful API in combination with centralized management and services
• Policy based, number of left and/or right characters
enables tokenization implementation with a single line of code per
exposed, with customizable mask character
field. Vaultless Tokenization is provided by dedicated, distributed-
cluster-capable Tokenization Servers, offering full separation of duties. • Authentication with Lightweight Directory Access Protocol
Tokenization management and configuration including an operational • (LDAP) or Active Directory (AD)
dashboard with convenient tokenization configuration workflows
occurs in a graphical user interface. Deployment Form Factors and Options:
Dynamic Data Masking. Policies define whether a tokenized • Open Virtualization Format (.OVA) and International
field is returned fully-or partially-masked based on user identification • Organization for Standardization (.iso)
controlled by an AD or LDAP server. For example, the policies could
• Microsoft Hyper-V VHD
enable customer service representatives to see only the last four digits
of credit card numbers, while account receivables staff could access • Amazon Machine Image (.ami)
the full credit card number. • Microsoft Azure Marketplace
Non-disruptive. Format preserving tokenization protects sensitive • Google Cloud Platform
data without changing the database schema.
System requirements:
• Minimum hardware: 4 CPU cores, 16–32 GB RAM
• Minimum disk: 80GB
Application integration:
• RESTful APIs
Performance:
• More than 1 million credit card size tokenization transactions
per second, per token server (using multiple threads and
batch (or vector) mode) on a 32-core server (dual-socket
Xeon E5-2630v3) with 16 GB RAM
4269-8572-9741-2570
CipherTrust
0544-4124-4325-3490 4269-8572-9741-2570
Tokenization
Application integration
• RESTful APIs
• .NET
• Java
CipherTrust Application Data Protection
Overview Operational flexibility is twofold:
CipherTrust Application Data Protection (CADP) offers DevSecOps- First, a broad range of cryptographic providers are available
friendly software tools for key management operations, as well as including native C through Crypto API (CAPI), PKCS#11, the
application-level encryption of sensitive data. The solution is flexible Cryptographic Service Provider (CSP) and Crypto Next Generation
enough to encrypt nearly any type of data passing through an (CNG) Providers for Windows and the Java Crypto Engine (JCE).
application. Protecting data at the application layer can provide the Second, encryption operational flexibility is delivered by the
highest level of security, as it can take place immediately upon data choice to encrypt locally or on CipherTrust Manager, for the library or
creation or first processing, and can remain encrypted regardless of Web Service edition of the product, without changing any code.
its data lifecycle state – during transfer, use, backup or copy. CADP
can be deployed in physical, private or public cloud infrastructure The choice is implemented with a simple configuration change.
to secure data even when it is migrating from one environment to
another, without any modifications to existing encryption or data Where to encrypt involves choices and potential benefits:
processing policies. • Encryption on CipherTrust Manager offers security, performance,
and scalability benefits, and for the highest level of security,
CADP is deployed with CipherTrust Manager, an architecture that
ensures that keys never leave the trusted CipherTrust Manager.
centralizes key and policy management across multiple applications,
Offloading encryption from application servers can enable them to
environments, or sites. The combined solution provides granular access
perform better. Embedded in CADP libraries are load-balancing
controls that separate administrative duties from data and encryption
mechanisms that enable an encryption load to be spread across a
key access. For example, a policy can be applied to ensure that no
cluster of CipherTrust Managers.
single administrator can make a critical configuration change without
additional approval. • Encryption on the application server can provide potentially higher
performance for certain types of encryption workloads. In contrast
CADP features built-in, automated key rotation, and offers a wide to open-source solutions, keys are encrypted in memory when not
range of cryptographic operations including encryption, decryption, in use, and scattered in memory when in use. Both mechanisms
digital signing and verification, secure hash algorithms (SHA), and secure crucial encryption keys from abuse.
hash-based message authentication code (HMAC).
CADP in concert with CipherTrust Manager provides a single interface
CipherTrust Application Data Protection is rich in function and provides for logging, auditing, and reporting access to protected data and
both development and, and operational flexibility: encryption keys.
Functional richness is delivered in the form of built-in server health
checking and failover coupled with multi-tiered load balancing and
Rich Encryption Ecosystem
built-in key rotation. In addition to the key management integrations discussed above,
CipherTrust Application Data Protection has integrations for Microsoft
Development flexibility is delivered with REST, C/C++, .NET Crypto Next Generation (CNG), Microsoft Crypto Service Provider
Core, Net and Java cryptographic libraries to enable creation of (CSP), Microsoft Online Certificate Status Protocol (OCSP), Hashi
crypto applications for the widest range of programming skills. Vault, HortonWorks, Apache HTTP and NGINX Servers, Lieberman
ERPM, and many others.
CipherTrust Manager
CipherTrust Manager
App
Servers/
Sensitive Data
Containers 0544-4124
- 4325-3490 App
Key Mgmt Servers/
Containers
</>
Sensitive Data
0544-4124-4325-3490 REST
</> Applications </>
Java / .NET Web
Encryption CipherTrust Application
Server
acme.com Application Data
Web Server Data Protection
Protection 4269-8572-9741-2570
Encrypted Data
Encrypted
Data 4269-8572-9741-2570
Database
Database
CipherTrust Application Data Protection installed as a Web Service
CipherTrust Application Data Protection with Installable Libraries
Key benefits Application Data Protection
• Centralized key management, freeing developers from Technical specifications
complex and risky key management stores
• Strengthen security and ensure compliance Development Libraries and APIs
• Leverage the cloud with utmost security • Java, C, and C# for .NET Core and .NET
KMIP Server/Provider
• On CipherTrust Manager
PKCS#11 provider
• Windows Server
• AIX
CipherTrust Manager Cluster
• Linux
• Solaris
CipherTrust Manager Cluster
CipherTrust Manager
Database Server
Sensitive Data
0544-4124-4325-3490
Sensitive Data CipherTrust
CipherTrust 0544-4124-4325-3490 Database
Database Sensitive Data CipherTrust
Protection
acme.com Protection
Web Server 0544-4124-4325-3490
Database Database
Encrypted Protection
data
Server written to database
Database
Encrypted data
Server written to database
Encrypted
Data 4269-8572-9741-2570
Database
Once installed, CDP triggers and views enable
110101001010010100101010
01010101010101010
0101010010101010
11100010100010001
1010100100010001010
CipherTrust
Data Discovery and
Classification
CipherTrust Manager
CipherTrust
Intelligent
Protection
© Thales - October 2023•GHv21
CipherTrust
Transparent Encryption
cpl.thalesgroup.com
Contact us – For all office locations and contact information, please visit cpl.thalesgroup.com/contact-us