DEC Banner

SafeNet Cipher Technology Partners

SafeNet Cipher Technology Partner Program

SafeNet Cipher Technology Partner Logo

The SafeNet Cipher Technology Partner Program provides technical, marketing, and business development support to vendors that add SafeNet’s solutions to secure their products.

Members of the SafeNet Cipher Technology Partner Program receive recognition for their verified integrations, go-to-market support, and a SafeNet point person. SafeNet uses its resources as a leader in data security to support members in promoting their solutions and satisfying an ever-growing customer base.

Sign Up for the SafeNet Cipher Technology Partner Program



Engage with Us Through Technology

Our partners are essential to customer success. Technology partners work with SafeNet to expand opportunities in the enhanced security marketplace and to forge innovative interoperability relationships. A full line of technical guides and software development kits (SDKs) are available to help with the integration process.

Multi-Factor Authentication

Authentication for Access Control Icon

SafeNet offers industry-leading authentication solutions driven by the broadest range of authenticators with unified management options and multiple integration options. These solutions give partners the tools they need to enhance their solution and provide value to customers. Integration options include:

  • Broad certificate-based / PKI authentication including interfaces for PKCS#11 v2.x, Microsoft CAPI, PC/SC, X.509 v3 certificate storage, SSL v3, Java, IPsec/IKE interfaces
  • Support for RADIUS, SAML, and OATH
  • Cross platform support covering traditional infrastructure (Windows, Mac, Linux and mobile (iOS Android, Microsoft and Blackberry)

Learn More

Encryption for Virtualized and Cloud Environments

Virtualization and Cloud Security - ProtectV Cloud Icon

SafeNet ProtectV provides full-drive encryption for virtual machines, instances, and storage containers. This enables organizations to confidently move their sensitive data to the cloud and virtualized data centers.

  • ProtectV Integration – SafeNet’s ProtectV manager provides APIs to automate the entire management process enabling cloud and virtualization migration, orchestration, and management solutions to enable customers to maintain ownership, compliance and control of their data.

Learn More

Hardware Security Module (HSM) Service

Hardware Security Modules

SafeNet Hardware Security Modules (HSMs) provide reliable protection for identities, transactions, and applications by securing cryptographic keys, as well as provisioning of encryption, decryption, authentication, and digital signing services. Integration options include PKCS#11, Microsoft CAPI, CNG, JCA/JCE, and OpenSSL.

Learn More

Cryptographic Key Management

Green Key Management Icon

SafeNet KeySecure provides Enterprise Key Management (EKM) from a single, centralized platform for managing cryptographic keys in both SafeNet and partner solution including key generation, key import and export, key rotation, and much more. By working with our partners, we can mutually enable our customers to simultaneously manage keys enterprise wide through a single, centralized key management platform and remove the burden and challenges of key management from our partner’s solutions.

  • KMIP – SafeNet is a leading adopter of the Key Management Interoperability Protocol and a broad adopter of KMIP with our partners.
  • KeySecure also includes APIS for iCAPI, KMIP, PKCS #11, JCE, MSCAPI, and .NET.

Learn More

Data Storage Security

Application Security Icon

The DataSecure integration toolkit enables interoperability with SafeNet DataSecure for application, database, mainframe, and file protection, which allows partners who develop customized security solutions to expand their products.

Learn More




view Benefits

Benefits of Being a SafeNet Cipher Technology Partner

Dedicated page for increased visibility: Technology Partners receive a dedicated page on SafeNet’s website. The website page includes a description of the integrated SafeNet/Technology Partner solution, as well as links to more detailed information.

Additionally, Technology Partners are provided access to the SafeNet Cipher Partner Portal , where they can update and change information about their companies and solutions.

Technical resources and product discounts: Technology Partners also get access to technical integration requirements as well as discounts for SafeNet products.

Additional benefits are available to program participants at higher membership levels.

Technology Partner Tiers:

  Silver Gold Platinum
RequirementsMaterials, brief written statement, and contact information required to produce a dedicated “Technology Partner” web page.
  • Development and execution of a co-marketing and sales plan.

  • Regularly scheduled meetings tracking progress against plan.

 
  • Invitation only

  • Strategic partnership

 
Technical Integration Requirements"Verified"
Proof-of-Integration is provided by either partner or by a third party in the form of an integration document.
Certified
  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

 
Certified
  • Integration must be proven and verified by both partners.

  • Integration document must be produced.

 



view Integration Requirements

Technology Partner Technical Integration Requirements

Verified Integration

Verified Partner Logo “Verified Integration” is achieved by providing documented  proof of integration. This can be provided by either partner (SafeNet or Technology Partner) or by a Third Party in the form of an “integration document” that must contain all of the following:

  • Technology Partner Solution Name and Description

  • SafeNet Solution Name and Description

  • Scope of Integration

  • Supported Platforms and Versions

  • Technical Partner and SafeNet Solution Prerequisites

  • Screen Shot or any Supporting Evidence of Integrated Solution

The “integration document” can come in the following forms:

  • Integration Document

  • A Section within a Comprehensive User Guide or Online Help (SafeNet or Partner’s). All of the following must be provided:

    • A Copy of the Specific Section in Reference to Integrated Solution

    • Reference Information Such as URLs, Page Numbers, or Documentation Names

     


Certified Integration

Certified Partner Logo Unlike “Verified” integration solution partners, the following is required for “Certified” integrations:

  • Integrated solution must be tested, proven, and verified by the Technology Partner and SafeNet.

  • A standalone and dedicated integration must be produced, edited, and approved by the Technical Partner and SafeNet



view Partner List

Platinum Partners

Partner NameSafeNet Integrated Solution Type
Amazon Web ServicesHSM, Key Management, Encryption, Authentication
IBMHSM, Authentication, Key Management, Encryption
MicrosoftHSM, Authentication, Key Management, Encryption
NetAppEncryption, Key Management


Gold Partners

Partner NameSafeNet Integrated Solution Type
ACI HSM
Blue Coat Encryption
CitrixAuthentication
DellAuthentication, Encryption, Key Management
DataCard/EntrustHSM, Authentication
F5 Networks HSM
Hitachi Data SystemsKey Management
HPAuthentication, Encryption, Key Management
OracleHSM, Authentication
Palo Alto Networks HSM, Authentication
SymantecHSM, Authentication, Key Management
VCEEncryption
VMwareEncryption, Authentication


Silver Partners

Partner NameSafeNet Integrated Solution Type
4PointHSM
Above SecurityKey Management
AconiteHSM
AdNovum Informatik AGHSM
AdobeHSM, Authentication
AEP NetworksHSM
AirWatchAuthentication
AJB Software Design Inc.HSM
AlfrescoHSM, Encryption, Key Management
AMIHSM
Andxor CorporationHSM
ApacheHSM, Encryption
AppleAuthentication
Arius TechnologyHSM
AscertiaHSM
Atlantic-Zeiser LtdHSM
AttachmateAuthentication
AustriaCard GmbHHSM
AvowHSM
AxwayHSM
Banksoft CorporationHSM
Barnes InternationalHSM
BecryptAuthentication
Bell IDHSM
BIO-keyAuthentication
Blue Ridge NetworksAuthentication
BMCAuthentication
BPC GroupHSM
BrocadeKey Management
BSBHSM
CA TechnologiesHSM
CeedoAuthentication
Certes Networks (formerly Cipheroptics)HSM
Check Point SoftwareAuthentication
CienaEncryption
CipherCloudKey Management
CiphermailHSM
CiscoAuthentication
Clear2PayHSM
Compass PlusHSM
Corestreet/AIHSM
CR2HSM
CryptomathicHSM
CryptoVision/cv cryptovision gmbhHSM
Cubic Transportation SystemsHSM, Key Management
CyberArkHSM, Authentication
Cyberoam     Authentication
DebianHSM
Digicert, Inc.Authentication
DNSSECHSM
DropboxEncryption, Key Management, Authentication
EMC Encryption
Eruces, Inc.HSM
EvidianAuthentication
EvoliumHSM
ExostarAuthentication
FalconStorKey Management
FIS (Fidelity)HSM
FortinetAuthentication
G&D (Giesecke & Devrient)HSM
GE EnergyHSM
GemaltoHSM
GlobalSign Inc.HSM, Authentication
Green Hills SoftwareHSM, Authentication
HandpointHSM
HB Technologies (Algeria)HSM
Health Payment SystemsHSM
HID/ActivIdentityHSM, Encryption
IAIKHSM
ICANNHSM
IdentrustHSM, Authentication
Imperva Inc.HSM
IMS Health (was Diversinet)HSM
InfobloxHSM
InnoveryHSM
Intercede GroupHSM
International Game Technology (IGT)HSM, Authentication
Interpro Technology, Inc.HSM
Intesi GroupHSM
Itron, Inc.HSM
JuniperAuthentication
Keyon AGHSM
Kyberpass CorporationAuthentication
Landis & GyrHSM
LinuxAuthentication
McAfeeAuthentication
ModirumHSM
Monet+HSM
MorphoHSM
MotorolaHSM
MultiCertHSM
N&TS GroupHSM
Nagra IDHSM
NBS Technologies, Inc./UbiqHSM
NCR CorporationHSM
NetMotionAuthentication
NetSeTHSM
NetSuiteAuthentication
neXusHSM
NuanceHSM
OATIHSM
Oberthur Card SystemsHSM
OCEUSAuthentication
OpenSSHAuthentication
OpenTrustHSM
OpenWay GroupHSM
PayProsHSM
PerspecsysKey Management
Ping IdentityHSM, Authentication
PKWareKey Management
Prime FactorsHSM
PrimeKey (EBJCA)HSM
Pronit/CardhallHSM
ProtegrityHSM
QuantumKey Management
RedHatHSM
RIM/CerticomHSM, Authentication
RiverbedEncryption
RJR Innnovations, Inc.Authentication
RS2 Software p.l.c.HSM
RxNTHSM
S2MHSM
Salesforce.comAuthentication
SamsungAuthentication
SAPHSM
Secunet Security Networks AGHSM
SecureKey TechnologiesHSM
SeglanHSM
SensusHSM
SepatonKey Management
Silver Spring NetworksHSM
Skyhigh NetworksHSM
SmartSoft (Cardtek Group)HSM
SoftFinancaHSM
SophosAuthentication
ST MicroelectronicsHSM
SugarCRMAuthentication
SymplifiedAuthentication
SyncplicityAuthentication
TaigleHSM
TantacommKey Management
TAS GroupHSM
TechTrex Inc.HSM
TECSHSM
TellwiseHSM
TeradataKey Management
TitusHSM
TotemoHSM
TPSHSM
TrilliantHSM
TrustCentralHSM
Trusted Security SolutionsHSM
TSYS Card TechHSM
ULHSM
Velocidata, Inc.HSM
Venafi, Inc.HSM
Verifone, Inc.HSM
VerizonHSM
WatchDoxHSM, Authentication
WatchGuardAuthentication
Wincor-NixdorfHSM
Winmagic Inc.Authentication
X InfoTechHSM
Xceedium Inc.HSM, Authentication
ZendeskAuthentication
Zertificon Solutions GmbHHSM
ZscalerAuthentication
view Overview
Apply Now to SafeNet Cipher Technology Partner Program
Technology Partner Search
Breach Level Index Site