Thales is pleased to announce the official release of CipherTrust Transparent Encryption UserSpace version 9.1.0. CipherTrust Transparent Encryption UserSpace delivers encryption and access controls for file system in UserSpace on Linux. It is independent of Linux kernels and it works across multiple flavors of Linux OS that makes deploying and maintaining…
Ensure enhanced encryption key control and data security for Google Cloud with CipherTrust Key Broker service on Thales Data Protection on Demand. CipherTrust Key Broker is integrated with Google Cloud EKM to make it easy for you to follow security and key management best practices, while leveraging the power of…
CipherTrust Transparent Encryption UserSpace version 9.0 Announcement
Thales is pleased to announce the official release of CipherTrust Transparent Encryption UserSpace version 9.0. CipherTrust Transparent Encryption UserSpace delivers encryption and access controls for file system in UserSpace. It is independent of Linux kernels and it works across multiple flavors of Linux OS that makes deploying and maintaining the…
PRODUCT Release: Thales CipherTrust Data Security Platform
Thales is pleased to announce the general availability of the following products – CipherTrust Manager version 2.0 CipherTrust Data Discovery and Classification version 2.0 CipherTrust Transparent Encryption version 7.0. CipherTrust Manager version 2.0 includes the following new capabilities: Rebranding: Next Generation KeySecure has been renamed to CipherTrust Manager CipherTrust Manager…
PRODUCT LAUNCH: Thales CipherTrust Data Security Platform
Thales is pleased to announce the launch of CipherTrust Data Security Platform that enables customers to Discover, Protect and Control sensitive data anywhere with next-generation data protection. Our new platform is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together…
Crypto Command Center v3.6.1 Now Available
Crypto Command Center version 3.6.1 introduces enhancements to the installation and initial configuration process for Luna Network HSMs, including: PostgreSQL: Local RPM install and config support Existing PostgreSQL configuration Download and configure PostgreSQL 10 JDK: Use previously installed JDK during installation Download and configure Fetch and use already installed Installation:…
PRODUCT LAUNCH: Thales CipherTrust Manager
Thales is pleased to announce the launch of CipherTrust Manager (“re-branded” name for Next Generation KeySecure) CipherTrust Manager enables organizations to centrally manage encryption key lifecycles and policies independent of where the data resides, and helps them meet data privacy and compliance requirements. It includes the following features: Key Features…
High Speed Encryption V5.1 Firmware Upgrade
The purpose of this bulletin is to provide guidance for transitioning to the V5.1 firmware release for all fielded appliances. Thales recommends that all HSEs be updated to the V5.1 firmware as soon as possible. The V5.1 is not backward compatible with prior versions of code but provides extensive feature…
End-of-Life Notification: SafeNet ProtectFile for AIX
Effective immediately, Thales announces the End-of-Life of the following products: Legacy Number Number Name 610-013023-001 S0872562 SW,KEYSECURE,PROTECTFILE,AIX,V8.2.1 610-013023-002 S1207988 SW,KEYSECURE,PROTECTFILE,AIX,V8.8.0 610-013023-003 S1211403 SW,KEYSECURE,PROTECTFILE,AIX,V8.8.1 610-013023-004 S1214210 SW,KEYSECURE,PROTECTFILE,AIX,V8.9.0 As a replacement product, Thales offers a market leading alternative available in Vormetric Transparent Encryption for AIX, SKU# VTE. For more information, please…
SafeNet ProtectFile Windows 8.11.1 and Linux 8.11.1 Now Available
Thales is pleased to announce the release of SafeNet ProtectFile Windows 8.11.1 and Linux 8.11.1. Safenet ProtectFile helps enterprise and goverment organizations to easily encrypt individual files and folders containing confidential information stored on client machines. Cryptograhically enforced access rights enable only authorized identities to read, write and modify encrypted…