CipherTrust Cloud Key Manager from Thales
Promote this Nomination
Photo Gallery
![]() |
![]() ![]() |
CipherTrust Cloud Key Manager from Thales



Additional Info
Company (that provides the nominated product / solution / service) | Thales |
Website | http://www.thalesesecurity.com |
Company size (employees) | 10,000 or more |
Type of solution | Software |
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:• Thales can confidently state that there is no product in the market today that directly competes with CipherTrust Cloud Key Manager. |
Brief Overview
There is a nexus of trends creating complexity across IT and SecOps teams. First is the migration of sensitive data to multi-cloud environments and the increased need for encryption to protect this data. The use of encryption is also on the rise and when properly aligned with key management, delivers powerful controls on data that help organizations both secure their data and attain compliance. Cloud provider encryption is typically used in conjunction with Bring Your Own Key (BYOK) capabilities so that customers can maintain control of their data. However, as the number of cloud vendors and volumes of data migrate to the cloud, so does the complexity to manage and report on all the keys. Thales’s CipherTrust Cloud Key Manager alleviates the complexity of BYOK lifecycle management by abstracting the unique complexities of BYOK across providers to 1) provide FIPS-compliant keys; 2) automate common tasks including some not easily offered by cloud providers; and, 3) delivering clear security reports for auditors.
The product enhances IT efficiency by providing automatic key rotation based on schedules or upon key expiration, centralizing key management across multiple clouds including keys created in cloud provider consoles, and prevents data loss by retaining keys in the key source for use in the event of accidental deletion in the cloud console.
The product enhances security by utilizing key sources certified up to FIPS 140-2 Level 3, and by enabling enhanced separation of duties by separating cloud key management from cloud consoles.
Furthermore, compliance is enhanced by centrally aggregating logging and providing reporting for key life cycle state changes across multiple clouds. Built-in reports also enable administrators to provide comprehensive information to compliance staff. Finally, activity logging to SIEMs can enable threshold-based detection of unexpected behavior indicative of a security breach.