What We Do

 

Primarily, we are crypto specialists with a very specialized knowledge

of Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Quantum Resistant Cryptography and Crypto-Agility

DATA PROTECTION

We will ensure you are compliant with security standards such as GDPR, FIPS, PCI-DSS and certification to SOC2 and ISO27001 standards covered. We will help you with your compliance and ensure you understand which cryptographic controls you should be using. Contact us for advice and help.

Key Management

Contact us if you are interested in evaluating (or deploying) some of the leading key management systems like: Venafi TPP, SafeNet KeySecure, Thales e-Security keyAuthority, HP Enterprise Secure Key Manager (ESKM), IBM Tivoli Key Lifecycle Manager (TKLM), and EMC’s RSA Data Protection Manager (DPM).

HARDWARE SECURITY MODULES (HSM)

SafeCipher has a continued rapport with all the leading crypto hardware vendors, especially Thales and SafeNet. We have significant experience with these leading vendors and their cryptographic products. We have the experience required to upgrade existing appliances to more current models.

Azure and AWS Crypto Security

Contact us for all your cloud and on-premises HSM, encryption, key management and security best practice requirements. Cloud-based HSM vs. on-premises HSM – how do you choose (ask us for help)? We can help with Azure and AWS encryption, Azure and AWS tenant key management.

Public Key Infrastructure (PKI)

PKI (Public Key Infrastructure) and cryptography is the cornerstone of our business and it is what we have been doing for over twenty years. We can advise you which is the correct path for your business: Public Cloud, On-Premises or Hybrid.

Cloud Cryptography

Key management is the Achilles heel of cloud encryption. Contact us to solve the problem of key management using your own keys. We will guide you through the whole BRING YOUR OWN KEY (BYOK) process.We can help you make the correct choice when approaching the subject of cryptography in the cloud.

Quantum Resistant Cryptography and Crypto-Agility

 

The Certification Authority Browser Forum, also known as CA/Browser Forum and the National Institute of Standards and Technology (NIST) are urging organizations to prepare NOW for the imminent quantum cryptographic break. RSA and ECC (Elliptic-Curve-Cryptography) are used for 99% of public key encryption and these are only computationally secure. A breakthrough in quantum computing may be sooner than we think which would render RSA and ECC useless.

 

SafeCipher is heavily involved in quantum resistant cryptography and will advise you on how best to start your quantum resistant roadmap. We have been working on algorithm agility, hybrid PKI solutions, HSM quantum-resistant ciphers, encryption and key-exchange quantum resistant algorithms, crypto-agility and much more. Contact us for more information. 

We deploy, support and supply all the leading HSMs

and associated crypto hardware. 

NShield_Connect_net HSM

Public Key Infrastructure (PKI) is the cornerstone of our business. We are fluent in all the leading PKI vendors

PKI vendors

We deploy, support and supply all the leading Key Management products including Venafi Trust Protection Platform 

1568919977-venafi-resources

We Work With


All the leading PKI products and all the major HSM vendors.

We use all the leading Key Management products. We deploy in the Public Cloud, On-Premises or Hybrid.