Main Menu
Main Menu
Data protection and encryption
We are convinced that the perimeter approach to security should evolve towards a vision focused on data and access protection.
KYOS provides you with its expertise and high-performance solutions to address your needs in terms of
- Protection of your data "at-rest" by encryption, tokenization or data masking
- Protection of your data in transit by encryption of your network connections
- Simple and centralized management of your cloud or on-premise encryption keys
- Secure key generation or storage solution
- Signature and transaction security
In this area we offer the following solutions together with our partners
Thales Payment HSM
- Thales Payment HSMs and management tools provide flexible, efficient transaction security for retail payment processing environments, internet payment applications, and web-based PIN delivery. Ensuring the security of consumer data is essential to the integrity of intra-bank network payments, ACH transfers, check clearing, mobile payments, and credit card transactions. In addition to meeting today’s government and industry regulations and standards, Thales Payment HSM solutions are designed to anticipate tomorrow’s.
Thales Luna HSM
- Protect the entire lifecycle of your keys within the FIPS 140-2 validated confines of the Thales Luna Network HSM. Our unique approach to protecting cryptographic keys in hardware positions our appliances as the most trusted general purpose HSMs on the market. Unlike other methods of key storage which move keys outside of the HSM into a “trusted layer,” the keys-in-hardware approach ensures that your keys always benefit from both physical and logical protections of the Thales Luna Network HSM.
Thales Data Protection on Demand
- The award winning Thales Data Protection on Demand is a cloud-based platform providing a wide range of cloud HSM and key management services through a simple online marketplace. Security is now simpler, more cost effective and easier to manage because there is no hardware to buy, deploy and maintain. Just click and deploy the services you need, provision users, add devices and get usage reporting in minutes. Cloud-based HSM services enable customers to protect critical cryptographic keys and to accelerate sensitive cryptographic operations for a wide range of security applications, across clouds, hybrid and on-premises environments.
Thales CipherTrust Manager
- CipherTrust Manager offers the industry leading enterprise key management solution enabling organizations to centrally manage encryption keys, provide granular access control and configure security policies. CipherTrust Manager is the central management point for the CipherTrust Data Security Platform. It manages key lifecycle tasks including generation, rotation, destruction, import and export, provides role-based access control to keys and policies, supports robust auditing and reporting, and offers developer friendly REST API.
Thales CipherTrust Cloud Key Manager
- CipherTrust Cloud Key Manager centralizes encryption key management from multiple environments, presenting all supported clouds and even multiple cloud accounts in a single browser tab. Advanced cloud key management capabilities include automated key rotation, key expiration handling, and cloud key vault synchronization. These dramatically reduce the time required for cloud key life cycle management. CipherTrust Cloud Key Manager goes well beyond support for BYOK with full key lifecycle management of native cloud keys as well as keys generated by its key sources.
nShield HSM
- nShield hardware security modules (HSMs) provide a environment for secure cryptographic processing, key generation and protection, encryption, HSM key management and more. nShield hardware security modules are available in three FIPS 140-2 certified form factors, nShield HSMs support a variety of deployment scenarios.
Nexus Certificate Manager (PKI)
- Smart ID Certificate Manager (CM) is a portfolio of Certificate Authority (CA) software including an OCSP responder and a timestamp server, acting within a Public Key Infrastructure (PKI). Certificate Manager supports a wide range of certificate enrolment protocols, enabling you to issue, manage and validate certificate-based electronic identities (eIDs) for people, infrastructure and objects.
Imperva
- Kyos started the partnership with Imperva in 2021 by selecting especially from the portfolio the Data Security solution which offers an advanced database protection solution. This solution is based on 3 main topics: Data Activity Monitoring (DAM), Data Risk and Assessment Server (DAS) and Data Risk Analytics (DRA).
CYSEC Appliance with HSM
- Confidential Computing protects data in use by performing computation in a hardware-based Trusted Execution Environment. These secure and isolated environments prevent unauthorized access or modification of applications and data while they are in use, thereby increasing the security level of organizations that manage sensitive and regulated data.
Azure & M365 – Data Protection
- Azure Information Protection: - provides ability to classify, label data, and protect it using encryption Cloud App Security - maintains control of your corporate resources. - improves visibility of cloud activity and helps to increase the protection of corporate data Intunes - helps you keep your employees secure while staying productive
More information on this subject?
We are at your disposal!