Search
Close this search box.
Randtronics Logo

SafeNet KeySecure end-of-life replacement

Migration path for end-of-life SafeNet KeySecure Customers

SafeNet KeySecure products reached end-of-life  and end of support in September 2022  (see announcement here)

It’s the end of the road for KeySecure product range and another step in the process of Thales consolidating overlapping products from its many acquisitions and encouraging customers to migrate to its CipherTrust range of products. 

Whilst it is always inconvenient being forced to re-platform, it does present an opportunity to KeySecure customers to investigate alternatives.

Randtronics is pleased to offer KeySecure customers our DPM easyKey product as a replacement key manager for KeySecure.

We would also highlight the additional benefits available that arise from a centralized key management solution that is HSM independent and also supports transparent data encryption, masking and tokenization.

Upgrade to a modern data privacy solution

For KeySecure customers seeking a replacement for their current enterprise key management platform  –  Randtronics Data Privacy Manager (DPM)  offers provides a flexible and scalable 100% software alternative :

  • 100% software-based policy-based solution that runs in standard Windows/ Linux key management system 
  • Database, File and folder level Transparent Data Encryption
  • Masking and Tokenization
  • Bring your own HSM – pick the Hardware Secure Module for applications that require high assurance hardware root-of-trust
KeySecure Replacement

Flexibility and support for data privacy best practice

DPM products enables customers to implement best practice security principle guidelines for policy-based key management, and policy-based data encryption.

For customers seeking to protect database contents at the column level,  DPM  also provides column level encryption, tokenization masking, and anonymization, 

DPM enforces access control and separation of duties and maintains a full audit trail.

Implementing effective encryption that locks down access to sensitive data everywhere does not have to be hard, nor require difficult to source skills 

Key benefits

  • Simplify your data privacy compliance burden:
    • Centralized, policy-based data key management with automated key-life-cycle operations
    • Standardized management of encryption keys, certificate, and KMIP compliant applications
    • Strict separation of duties
    • Fully auditable
  • Protect everything using a single platform:
    • Transparent Data Encryption (TDE) protection for databases, servers and laptops
    • Tokenization and field-level data de-identification 
  • Reduce reliance on specialist skills:
    • DPM runs standard Windows/ Linux/ database operating environments (SOE)
    • familiar technologies for most IT organizations.  

Latest news and articles

Our Customers

Letter from the CEO

Rantronics Logo

Thank you for visiting the Randtronics website.

We make enterprise encryption easy.

Smart businesses already know that only encryption can reduce the attack surface and stop the hackers from stealing their sensitive data. A company that only uses encryption is more secure than a company with all other cyber security measures. Privacy standards such as PCI DSS, HIPAA, and GDPR are all mandating in law the protection of the citizen’s personal data. Fines for breaches are huge. You won’t get fined if your firewall is hacked. You won’t get fined if you suffer a virus or ransomware attack. You WILL get fined if you lose ANY personal data pertaining to ANY citizen. The lowest common denominator is the DATA. Data that is “Encrypted” is out of the scope of the Law.

Whilst all understand the need to protect sensitive data holistically (such as NIST Cyber Security Framework or 12 prescriptive PCI DSS guidelines) their cyber security priorities are misguided to say easy aspects and not addressing “what happens” when these fail? Encryption of data is the only direct protection measure that renders data unreadable compared to upgrading firewalls or virus and malware, IPS, log monitoring, etc. I am saying you need all methods but unless you have implemented enterprise grade encryption you are still unprotected like driving a car without “seatbelts”. “Enterprise grade encryption” as a cyber measure is the “seat belt” that saves lives in car accidents. Industry experts predict a relentless continuation of data breaches this year and penetration testing have proven perimeter defense is easily penetrable.

Randtronics has taken the challenge to make encryption easy and is innovating in many areas. We have already reduced deployment effort to days, use familiar standard components so that less skilled people can deploy and maintain systems.
I welcome discussions via email or phone as through your feedback we will be challenged to continue to innovate to the point where businesses and users do not need to be intimidated when using encryption as the worlds most powerful tool to protect their sensitive data.

Experts predict data breaches will continue at relentless pace, let Randtronics secure your business with “Enterprise grade ubiquitous encryption technology”. Time is of the essence. Why not be pro-active? I invite you to let Randtronics and its global distributors and resellers assess and assist your business directly.

Yours sincerely,
Bob K Adhar, BE, MBA, CISSP
Founder and CEO