Contact Us

The World’s First Crypto Hypervisor

Introducing Cloud-Delivered Encryption

Crypto Hypervisor Logo

A crypto hypervisor revolutionizes the delivery of encryption. IT departments can now deliver on-demand, elastic crypto services for data protection—in minutes, not days. Our crypto hypervisor is the combination of SafeNet Crypto Command Center together with the proven SafeNet Hardware Security Module (HSM).

For the first time, high-assurance encryption services fit the cloud operations model. Now the full cost and innovation advantages of virtualization can be exploited without compromising security or compliance.

Admin- & User-Friendly Cryptography: IT maintains full, centralized control of the delivery of encryption services. Users have full control of their cryptographic resources knowing that other tenants and administrators cannot access their encryption keys.


view Benefits

The Benefits of Cryptography as a Service

It is common to deploy encryption for the protection and compliance of sensitive and personal information. The security level of any encryption solution often comes down to the security of the encryption keys. Storing the keys in special-purpose hardware, such as a Hardware Security Module (HSM), is recommended by experts as a best practice. 

However, until now hardware encryption solutions have not provided the agility and flexibility needed in virtualized and cloud environments. Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project.

Enter Crypto Hypervisor. The first high-assurance key vaulting solution built for the cloud operational model. Enterprises can consolidate all their key vaulting and PKI services by moving away from physical HSMs to virtualized HSMs using our crypto hypervisor. Service Providers can add high-value key-vaulting and PKI services to their hosted and cloud offerings that allow them to administrate the HSMs but never access their customers’ keys.

SafeNet Global Data Protection Icon

"Xceedium relies on SafeNet’s capabilities to deliver high assurance versions of Xsuite, the company’s privileged identity management platform. SafeNet’s Crypto Hypervisor has the potential to be a game-changer in the way we employ crypto resources. Xsuite protects very large hybrid-cloud enterprises and the Crypto Hypervisor design is right in line with Xsuite’s architecture and our customer scalability, cost and security requirements."

– Mordecai Rosen, Vice President Business Development at Xceedium


  • Dramatic cost savings. Not only can your hardware requirements be reduced by as much as 95%, but SafeNet’s automation processes saves hours of work for each cryptographic resource.

  • Simplified management and administration. Self-service and encryption templates mean that crypto expertise isn’t required for crypto rollouts anymore.

  • Fewer security gaps. Centralized crypto expertise results in security and encryption policies that are enforced consistently across the enterprise.

  • Fast rollout. Now an enterprise can implement encryption in a new application in minutes, not hours.

  • Proven: Built on the market leading SafeNet Luna SA HSMs which currently provide protection for over $1 trillion in daily financial transactions.


view Innovations

Innovations in the Crypto Hypervisor

Cloud Data Protection Icon

As a leader in the security market, SafeNet is focused on bringing strong, innovative security solutions to next-generation environments like the cloud. Powered by the SafeNet Crypto Command Center and Hardware Security Modules (HSMs), our crypto hypervisor represents the culmination of years of research and development:

  • Crypto Command Center. With this management interface admins can manage hundreds of virtual HSMs and administrators can publish a list of on-demand service templates for their users. These templates are on a web page that is easy to navigate. The users are only offered services that they have permission to create.

  • Virtualized crypto hardware. SafeNet Crypto Command Center abstracts HSMs into many dynamic crypto resources that maintain access controls and user experience as if each resource were a dedicated physical HSM. Multi-tenancy is supported, establishing an environment in which many organizations can leverage the same hardware without fear of keys being lost or stolen by other tenants. Even administrators can’t access the users’ keys.

  • Separation of roles and responsibilities in multi-tenant environments. Users maintain access to their key material while the central authority sets overall security policies.

Cloud Ready Crypto Hypervisor
view Resources

Crypto Hypervisor Resources

   Crypto Command Center Product Brief

Product Brief - Crypto Resource Management with Crypto Command Center

Together SafeNet Crypto Command Center and SafeNet HSMs combine to form one complete, centralized solution for the management of your crypto HSM resources – a crypto hypervisor. Deliver on-demand, elastic key vaulting and encryption services for data protection in minutes instead of days, while maintaining full control of your encryption services and data.

   White Paper - Intro Crypto Command Center HSM Provisioning Cloud

White Paper - Intro Crypto Command Center HSM Provisioning Cloud

The Crypto Hypervisor is the first solution that virtualizes hardware-based cryptographic modules into consumable, elastic, and isolated cryptographic resources for use by virtual applications in need of encryption. A fundamental component of the Crypto Hypervisor is the Crypto Command Center, which provides the capability to define, manage, and deploy cryptographic resources on an as-required basis.

White Paper - Securing Luna HSM Connections in Virtual Environments

White Paper - Securing Luna HSM Connections in Virtual Environments

The sense of safety that many enterprises had, based on their physical security measures, is being eroded since the data and services are no longer guaranteed to be physically secure. This paper explores the virtual security measures companies need to take, including how to properly secure Luna hardware security modules' connections.

View All Resources Here

view Overview
Recent Blog Posts -The Art of Data Protection

After a list of Comcast email accounts were offered for sale in an underground store, consisting of customers’ Comcast email addresses and associated passwords, Comcast—one of the largest providers of cable, internet and phone services in the US—forced a password … Read More >>

We’ve talked quite a bit recently about what it means to unshare your sensitive data and deploy encryption as an IT service to unify data protection company wide. If you’ve found yourself nodding in agreement as you’ve read these posts, … Read More >>

visit blog
Crypto Command Center Freemium CTA
CTA - Crypto Command Center WP