Trustway DataProtect App
Trustway DataProtect App provides an interface for key management operations, as well as application-level encryption of sensitive data.
As sophisticated threats emerge and the risk of data exposure grows, encryption is the critical last line of defense when other security measures fail. Application encryption has become essential for data protection, encrypting data at the earliest stages of the information lifecycle to helporganizations minimize risk, strengthen security and meet regulatory and compliance mandates.
Trustway DataProtect App brings the capability to encrypt data as soon as they are generated and before they spread to different environments and infrastructure.
In combination with Trustway DataProtect KMS based on certified HSM architecture, Trustway DataProtect App meets the strictest international standards and brings the highest level of security in your data protection.
Follow or contact us:

Centralize management
Based on HSM architecture, this unified platform provides key management and encryption services for all your infrastructure solutions. Enhanced by monitoring and granular access control features, it guarantees a unique data protection policy for your company and reduces compliance and audit costs.

Strengthen data security
Benefit from a tamper-proof appliance based on a 100% European-certified HSM architecture to guarantee data protection throughout the entire data lifecycle inside your application.

Achieve compliance
A highly available encryption solution to address numerous industry security standards and government regulations such as PCI DSS, GDPR and HIPAA.
Transparent, strong and efficient application encryption
- Protect sensitive data with application-level encryption
- Securely manage keys centrally in an industry-leading, Common Criteria certified enterprise key manager
Support for format preserving encryption (FPE)
- Flexible key management interfaces
- Multiple interfaces available for full key management lifecycle
High performance
- Offload cryptographic processing to Trustway Key Manager
- Built-in health checking and multi-tiered load balancing
Broad standard and interface support
- Java C/C++, .Net
- XML open interface, KMIP standard
- Web services, including SOAP and REST
Easy deployment and management
- Deploy in physical, virtual, and public cloud environments
- Built-in key rotation
- Customizable sample applications for quick, easy deployment
HSM certifications
- Common Criteria EAL4+ compliant with CWA 14167-2 PP
- FIPS 140-2 Level 3 (in progress)
- EU RESTRICTED
- NATO SECRET
- Qualification Renforcée (the highest qualification from ANSSI)
- Compliant with eIDAS
Web application servers: Apache Tomcat, IBM WebSphere, JBoss, Microsoft IIS, Oracle WebLogic, SAP NetWeaver, Sun ONE…
Cloud and virtual infrastructures: works with all major cloud platforms including AWS, Azure, IBM Cloud, Google and VMware
Development libraries and APIs: Java, C/C++, .NET, XML open interface, KMIP standard
Web services: SOAP and REST
Encryption algorithms: Including 3DES, AES-256, SHA-256, SHA-384, SHA-512, RSA- 1024, RSA-2048, RSA-3072, RSA-4096
Supported platforms for ICAPI provider: Red Hat Enterprise Linux 5.4 and above, Microsoft Windows 2003, 2008 R2, and 7 in both 32-bit and 64-bit
Certificates: X509, PKCS1, PKCS8, PKCS12, Export, Import, MonitorSize and Weight
Trustway DataProtect offers a comprehensive data encryption solution to guarantee data security and the control on the data access.
This solution provides the customer with the tools to the capabilities to encrypt all the data format as Virtual Machine, Database, File system, Application and Tokenization. Trustway DataProtect is a complete solution for cloud, virtual and on-premises infrastructures and is compliant with the most restrictive data privacy regulations as GDPR, HIPAA or PCI DSS.
Trustway DataProtect KMS >>
Trustway DataProtect KMS is a centralized key management administration platform. This standards-compliant interface (PKCS#1) allows you to manage keys on every environment (cloud, virtual, on-premises) to enable information system audits and robust access control.
Trustway DataProtect DB >>
Connected to Trustway DataProtect KMS, Trustway DataProtect DB provides your organization with total database protection in the data center and the cloud, thanks to centralized control and a regular key rotation. You directly select which data fields to encrypt.
Trustway DataProtect VM >>
Connected to Trustway DataProtect KMS, Trustway DataProtect VM brings complete cloud data protection, guaranteeing your organization a secure migration to the cloud, ensuring only authorized users can access information, and meeting compliance mandates. With Trustway DataProtect VM, you can now isolate and totally control your virtual machine instances.
Trustway DataProtect File >>
Connected to Trustway DataProtect KMS, Trustway DataProtect File ensures data security, denying unauthorized user access to your files through fully automated file encryption of unstructured data contained in network drives and file servers.
Trustway DataProtect Token >>
Connected to Trustway DataProtect KMS, the Trustway DataProtect Token solution protects sensitive information by replacing it with a surrogate value that preserves the length and format of the original data. This solution can be deployed across cloud, virtual and on-premises environments to secure data such as credit cards, social security numbers, etc.
Related resources
Factsheet
Trustway DataProtect App: A total data protection in your applications
Trustway DataProtect App brings your organization total application protection thanks to centralized data access control.
Brochure
Download: Securing your end-to-end infrastructure with unified encryption
Discover Trustway DataProtect, a data protection solution that secures your data, regardless of the location — whether stored in a database, file server, application, traditional or virtualized data center, or public cloud environment.
White paper
Download: Prevent ransomware attacks from taking down your business and defend your data
Drastic emergency situations provide a conducive environment for criminals to perform cyberattacks. Ransomware attacks today are clearly on the rise, and the risk of an organization’s sensitive data being stolen is higher. Read our white paper to learn more about ransomware and how to protect your sensitive data.
Brochure
Trustway HSM: Data Security – Choosing the right path through compliance
Compliant, flexible and innovative, our range of hardware security modules brings companies and critical infrastructures the reliability of an innovative and robust architecture in compliance with strict security demands.