- Cryptographic Key Management for the Cloud
- Encryption Solutions for the Cloud
- Virtual Network Encryption
As cloud service providers such as Microsoft roll out new services at a staggering rate, customers must take advantage of these capabilities while still fulfilling their obligation to “own the data” by securing the data with encryption and cloud independent key management. Now, customers can leverage the encryption capabilities built into the Microsoft cloud while using SafeNet AT KeySecure for Government to manage and maintain ownership of their encryption keys.
Using the ProtectApp APIs supported by KeySecure for Government and Azure Key Vault, SafeNet AT has developed a reference tool called SafeNet AT ManageAKV that implements the integration between KeySecure for Government and Azure Key Vault. The ManageAKV tool securely authenticates to KeySecure for Government (using the ProtectApp Java/JCE SDK) and Azure (using the Azure APIs) and is used as the secure conduit to issue commands to KeySecure for Government and Azure Key Vault related to the management of customer managed keys.
The ManageAKV tool is provided as part of ProtectApp JCE. For more information, download the Azure Key Vault and KeySecure for Government Solution Brief.
The ProtectV release 4.7.3 is a minor release that specifically addresses two high severity issues found in release 4.7.0. Refer to the ProtectV 4.7.3 Customer Release Notes for details. Details on release 4.7.0 are included below.
ProtectV 4.7.0 Release Summary (Released released 30 January 2019)
SafeNet ProtectV 4.7.0 release also supports ProtectV clients for Ubuntu 18.04 LTS and RHEL 7.6, and enable either automatic or manual control of disk encryption in Windows servers.
KeySecure for Government 8.12.1 is now available. This release specifically addresses an issue found in release 8.12.0 concerning the SafeNet Virtual KeySecure G350v connected to a Remote HSM, both VMWare and AWS. It was discovered that after successfully registering a G350v to a remote HSM, object such as Keys, Local CAs, Certificates and Cluster Keys cannot be created. SafeNet AT strongly recommends implementing release 8.12.1 for VMWare instead of release 8.12.0 to forestall any possible issues with remote HSM functionality. Customers who use G350v on AWS should remain on version 8.11.0. This ONLY effects Virtual KeySecure G350vs that are registered to a Remote HSM. All other KeySecure platforms (G460 and G160) are NOT affected, nor are G350vs that do not register to a Remote HSM. If you are NOT using a Remote HSM then release 8.12.0 may be used for G350v (VMWare or AWS).
The SafeNet Ethernet Encryptor CN6140 is now available for sale to the U.S. Federal Government. The CN6140 is a multi-port (1 or 10 Gbps), high-assurance encryptor designed to provide up to 40 Gbps (4x10), full line rate transparent encryption for all voice, video, and data communications moving across dark fiber, and metro or wide area Ethernet networks (MAN or WAN).
5.0.1 Firmware Release
In addition to the new hardware appliance, a firmware update is available for all HSE appliances and includes the following new features and enhancements:
Note: Firmware is not backwards compatible due to changes in support of new NIST requirements.
Download the resources below to learn more about the SafeNet Ethernet Encryptor CN6140
SafeNet AT announces the End-of-Support (EOS) and End-of-Life (EOL) dates for the MDeX System. While SafeNet AT will no longer accept orders for MDeX units, support for existing fielded units will continue through the End-of-Support date noted below.
SafeNet AT will maintain limited spares and support capability throughout the life of all contracts currently in place. For customers with active and paid service and support contracts, support will be available until the termination date of the contract, even if this date exceeds the Last Date of Support shown in the Milestone Dates table below.