Data Encryption

From risk to opportunity: security builds trust

Our cybersecurity products for your Data Protection

As a European leader of data protection, Bull guarantees the confidentiality of your sensitive data and offers a support through your ‘digital transformation’ in compliance with new regulations (GDPR, PCI DSS, HIPAA).
Our data encryption solutions protect you from all risks of cyberattacks in connecting your equipments to virtual environments. Our different ranges will suit every demand from protecting hardware key management and cryptographic operations to securing information flows in large sensitive networks.
With its wide-ranging technology expertise and its R&D centers dedicated to cybersecurity in France, Bull helps you to build a secure infrastructure for an efficient, proportionate and sustainable cybersecurity policy.

Bull cyber security Data encryption

HSM Trustway Proteccio™ NetHSM

Innovation in security technology is the master word with the Hardware Security Module TrustWay Proteccio™ NetHSM for data encryption. Eight independently managed cryptographic virtual HSMs sheltered in one physical HSM are made available for a high-secured operational flexibility.

MORE INFORMATION

HSM TrustWay Proteccio™ OEM

The Hardware Security Module TrustWay Proteccio™ OEM offers the possibility to deploy custom applications that are integrated then securely executed in the appliance and benefit from an easy programmability environment.

MORE INFORMATION

HSM Trustway Proteccio™ USB

The Hardware Security Module TrustWay Proteccio™ USB offers control and security. The USB connectivity allows maintaining the sensitive environment offline in order to avoid any loss of data, a direct connectivity between the customer’s machine and the HSM. One of the benefits is also the rackable platform of a U to be easily integrated into your infrastructure.

MORE INFORMATION

HSM Crypt2pay payment

The Hardware Security Module TrustWay crypt2pay is specially designed to secure withdrawal and payment transactions using credit, debit or store cards (authorization requests). It secures face-to-face transactions of all types, with or contactless payments, including contactless payments, as well as Internet sales.

MORE INFORMATION

Related resources and actuality

Brochure HSM

Data Security – Choosing the right path through compliance

Compliant, flexible and innovative, our Hardware Security Module range brings to companies and critical infrastructures the reliability of an innovative and robust architecture in compliance with strict security demands.

Factsheet HSM

Certified HSM – The root of your security

TrustWay Proteccio is a Hardware Security Module (HSM) providing software solutions with a high-performance and highly secure environment where they can carry out their most sensitive cryptographic operations.

Newsroom

The « Assises de la Sécurité »

October 11-14th 2017, Monaco
Meet us on the Atos-Bull booth n°11

Partners program

Private zone for customers and partners

Bull support consists of an international team of experts who will help you get optimal use out of our products in your specific environment every day.

Data Protection Suite

Data Protection Suite offers a comprehensive data encryption solution to guarantee data security and the control on the data access.

This solution provides the customer with the tools to the capabilities to encrypt all the data format as Virtual Machine, Database, File system, Application and Tokenization. Data Protection Suite is a complete solution for cloud, virtual and on-premises infrastructures and is compliant with the most restrictive data privacy regulations as GDPR, HIPAA or PCI DSS…

MORE INFORMATION

TrustWay Key management server

TrustWay Key manager is a centralized administrative platform of key management. This compliant standardized interface (PKCS#1) allows you to manage keys on every environment (cloud, virtual, on-premises), to make SI audit and a meticulous access control.

TrustWay DB encryption

Connected to TrustWay Key manager, TrustWay DB encryption brings to your organization a total protection of your database in the Datacenter and the Cloud thanks to a centralized control of data access and a regular key rotation. Data field to encrypt is directly selected by you.

TrustWay V encryption

TrustWay V encryption brings a complete Cloud data protection which guarantees to your organization a secure migration to the cloud, ensures only authorized users to access information, and meets compliance mandates. With this solution, you can now isolate and totally control your virtual machine instances.

TrustWay app encryption

Connected to TrustWay Key manager, TrustWay App encryption is a highly-secured application encryption’s solution which centralizes administration of application encryption policy and keys. This solution is suitable for a large range of web applications’ servers and company applications.

TrustWay file encryption

TrustWay File encryption ensures data security through fully automated file encryption of unstructured data contained in network drives and file servers. Your files can not be read by unauthorized users anymore.

TrustWay Tokenisation

TrustWay Tokenisation solution protects sensitive information by replacing it with a surrogate value that preserves the length and format of the original data. This solution can be used to secure for instance credit cards, social security numbers, etc. It can be deployed across cloud, virtual and on-premises environments.

Actuality and partner program

Newsroom

The « Assises de la Sécurité »

October 11-14th 2017, Monaco
Meet us on the Atos-Bull booth n°11

Private zone for customers and partners

Bull support consists of an international team of experts who will help you get optimal use out of our products in your specific environment every day.

TrustWay VPN3

The appliance for IP network encryption TrustWay VPN3 provides to secure the large and medium volume data flows typical of central sites, regional branch offices and subsidiaries. In terms of cryptographic performance it delivers up to 900 Mbps in IPsec with an addressing capability accepting up to 20,000 IP endpoints, with no limit on the number of tunnels.

MORE INFORMATION

TrustWay CRX

This compact appliance for IP network encryption is ideally suited to applications of the “Branch Office” and “Home Office” type that use low volume network links (xDSL). TrustWay CRX features an Ipsec of 6 Mbps with an addressing facility that accepts up to 50 IP endpoints.

MORE INFORMATION

TrustWay VPN client

TrustWay VPN Client is a software component for PCs that provides a secure link for mobile users, so they can freely exchange data securely with their organization, as on a encrypted IP network.

MORE INFORMATION

TrustWay chronos

Our IP networks encryption solutions guarantee the high security of CNI and Defense Industry. They meet the requirements of the French Military Programming Law regarding the duty of CNI to take appropriate cybersecurity actions on critical information systems.

MORE INFORMATION

Related resources and actuality

Newsroom

The « Assises de la Sécurité »

October 11-14th 2017, Monaco
Meet us on the Atos-Bull booth n°11

Private zone for customers and partners

Bull support consists of an international team of experts who will help you get optimal use out of our products in your specific environment every day.

Trustway globull secure external drive

TrustWay globull

TrustWay globull is a highly-secured external drive. It allows users to address mobility issues and respond to the need for high levels of security going up to defense-level security.

MORE INFORMATION

Related resources and actuality


Factsheet TrustWay globull – FR

The heart of my computer always beats with me

With TrustWay globull, you can work everywhere securely with serenity. It protects all your sensitive internal documents which could be subject to a cyberattack.

Newsroom

The « Assises de la Sécurité »

October 11-14th 2017, Monaco
Meet us on the Atos-Bull booth n°11

Private zone for customers and partners

Bull support consists of an international team of experts who will help you get optimal use out of our products in your specific environment every day.

Interested in our Data encryption product range ?