SafeNet Cipher Technology Partner Program
The SafeNet Cipher Technology Partner Program provides technical, marketing, and business development support to vendors that add SafeNet’s solutions to secure their products.
Members of the SafeNet Cipher Technology Partner Program receive recognition for their verified integrations, go-to-market support, and a SafeNet point person. SafeNet uses its resources as a leader in data security to support members in promoting their solutions and satisfying an ever-growing customer base.
Sign Up for the SafeNet Cipher Technology Partner Program
Engage with Us Through Technology
Our partners are essential to customer success. Technology partners work with SafeNet to expand opportunities in the enhanced security marketplace and to forge innovative interoperability relationships. A full line of technical guides and software development kits (SDKs) are available to help with the integration process.
SafeNet offers industry-leading authentication solutions driven by the broadest range of authenticators with unified management options and multiple integration options. These solutions give partners the tools they need to enhance their solution and provide value to customers. Integration options include:
- Broad certificate-based / PKI authentication including interfaces for PKCS#11 v2.x, Microsoft CAPI, PC/SC, X.509 v3 certificate storage, SSL v3, Java, IPsec/IKE interfaces
- Support for RADIUS, SAML, and OATH
- Cross platform support covering traditional infrastructure (Windows, Mac, Linux and mobile (iOS Android, Microsoft and Blackberry)
Encryption for Virtualized and Cloud Environments
SafeNet ProtectV provides full-drive encryption for virtual machines, instances, and storage containers. This enables organizations to confidently move their sensitive data to the cloud and virtualized data centers.
- ProtectV Integration – SafeNet’s ProtectV manager provides APIs to automate the entire management process enabling cloud and virtualization migration, orchestration, and management solutions to enable customers to maintain ownership, compliance and control of their data.
Hardware Security Module (HSM) Service
SafeNet Hardware Security Modules (HSMs) provide reliable protection for identities, transactions, and applications by securing cryptographic keys, as well as provisioning of encryption, decryption, authentication, and digital signing services. Integration options include PKCS#11, Microsoft CAPI, CNG, JCA/JCE, and OpenSSL.
Cryptographic Key Management
SafeNet KeySecure provides Enterprise Key Management (EKM) from a single, centralized platform for managing cryptographic keys in both SafeNet and partner solution including key generation, key import and export, key rotation, and much more. By working with our partners, we can mutually enable our customers to simultaneously manage keys enterprise wide through a single, centralized key management platform and remove the burden and challenges of key management from our partner’s solutions.
- KMIP – SafeNet is a leading adopter of the Key Management Interoperability Protocol and a broad adopter of KMIP with our partners.
- KeySecure also includes APIS for iCAPI, KMIP, PKCS #11, JCE, MSCAPI, and .NET.
Data Storage Security
The DataSecure integration toolkit enables interoperability with SafeNet DataSecure for application, database, mainframe, and file protection, which allows partners who develop customized security solutions to expand their products.
Benefits of Being a SafeNet Cipher Technology Partner
Dedicated page for increased visibility: Technology Partners receive a dedicated page on SafeNet’s website. The website page includes a description of the integrated SafeNet/Technology Partner solution, as well as links to more detailed information.
Additionally, Technology Partners are provided access to the SafeNet Cipher Partner Portal , where they can update and change information about their companies and solutions.
Technical resources and product discounts: Technology Partners also get access to technical integration requirements as well as discounts for SafeNet products.
Additional benefits are available to program participants at higher membership levels.
Technology Partner Tiers:
view Integration Requirements
|Requirements||Materials, brief written statement, and contact information required to produce a dedicated “Technology Partner” web page.||
|Technical Integration Requirements||"Verified"|
Proof-of-Integration is provided by either partner or by a third party in the form of an integration document.
Technology Partner Technical Integration Requirements
“Verified Integration” is achieved by providing documented proof of integration. This can be provided by either partner (SafeNet or Technology Partner) or by a Third Party in the form of an “integration document” that must contain all of the following:
Technology Partner Solution Name and Description
SafeNet Solution Name and Description
Scope of Integration
Supported Platforms and Versions
Technical Partner and SafeNet Solution Prerequisites
Screen Shot or any Supporting Evidence of Integrated Solution
The “integration document” can come in the following forms:
Unlike “Verified” integration solution partners, the following is required for “Certified” integrations:
view Partner List
Integrated solution must be tested, proven, and verified by the Technology Partner and SafeNet.
A standalone and dedicated integration must be produced, edited, and approved by the Technical Partner and SafeNet
Integrated Solution Type|
|Amazon Web Services||HSM, Key Management, Encryption, Authentication|
|IBM||HSM, Authentication, Key Management, Encryption|
|Microsoft||HSM, Authentication, Key Management, Encryption|
|NetApp||Encryption, Key Management|
Integrated Solution Type|
|Dell||Authentication, Encryption, Key Management|
|Hitachi Data Systems||Key Management|
|HP||Authentication, Encryption, Key Management|
Palo Alto Networks
|Symantec||HSM, Authentication, Key Management|
Integrated Solution Type|
|Alfresco||HSM, Key Management|
|Check Point Software||Authentication|
|Dropbox||Encryption, Key Management, Authentication|
|HID/ActivIdentity||HSM, Authentication, Encryption|
|Landis & Gyr||HSM|
|Skyhigh Networks ||HSM, Key Management|
|Xceedium Inc.||HSM, Authentication|
|Zertificon Solutions GmbH||HSM|