Trustway DataProtect KMS
Trustway DataProtect KMS is a data protection solution with a centralized key management platform enhanced with data access control and monitoring features.
Trustway DataProtect KMS employs various standardized interfaces, enabling you to manage keys and provide encryption services for all enterprise applications on any environment (cloud, virtual or on-premises).
Trustway DataProtect KMS ensures easy information system (IS) audits and robust access control for encrypted data.
Based on our experience building tamper-proof infrastructure, Atos provides a key management solution based on hardware infrastructure that meets the strictest international standards and brings the highest level of confidentiality.
Whether it is stored in a database, file server, application, traditional or virtualized data center, or public cloud environment, your sensitive data is secure from compromise — regardless of its location.
You need full coverage to guarantee total data protection, which is why Trustway DataProtect KMS supports a broad encryption ecosystem.
Follow or contact us:

Centralize management
Based on HSM architecture, this unified platform provides a key management solution and data encryption services for all your infrastructure applications, compliant with your security policy.

Reduce cost
Enable more cost effective key management and data encryption with a centralized key management solution and automated operations. Enhanced by monitoring and granular access control features, it guarantees a unique data protection policy for your company and reduces compliance and audit costs.

Simplify compliance
Efficiently audit key management practices, save staff time, and simplify the attainment of compliance mandates with efficient, centralized auditing of key management practices such as GDPR, PCI-DSS and HIPAA.
Heterogeneous key management
Manage keys for a variety of encryption products (including tokenization) and applications, as well as self-encrypting drives, tape archives, storage area networks (SAN) and a growing list of vendors supporting the OASIS Key Management Interoperability Protocol (KMIP) standard.
Full lifecycle key support and automated operations
Simplify the management of encryption keys across the entire lifecycle, including secure key generation, storage and backup, key distribution, deactivation and deletion. Automated, policy-driven operations simplify key expiry and rotation tasks.
Centralized administration of granular access
Authorization controls and separation of duties. A centralized management console unifies key management operations across multiple encryption deployments and products, while ensuring administrators are restricted roles defined for their scope of responsibilities. Trustway Key Manager can also utilize existing LDAP or AD directories to map administrative and key access for applications and end users.
High-availability, intelligent key sharing
Deploy in flexible, high-availability configurations within an operations center and across geographically dispersed centers or service provider environments using active-active clustering.
Auditing and logging
Detailed logging and audit tracking of all key state changes, administrator access and policy changes. Audit trails are securely stored and signed for non-repudiation and can be consumed by leading third-party SIEM tools.
Third-party integration
- Analytics: IBM Qradar, HPE ArcSight, Splunk, RSA Security Analytics, Above Security
- Application servers: IBM WebSphere, Oracle Weblogic, Microsoft IIS, Apache Tomcat, Red Hat JBoss
- Backup solutions: Commvault Simpana, Symantec NetBackup (via NetApp)
- Cloud storage: Nutanix, Amazon Web Services S3, DropBox, Google Cloud Storage, Google Drive, NetApp Cloud ONTAP, NetApp AltaVault, Panzura Storage Controller
- Cloud access security brokers (CASB): CipherCloud, SkyHigh Networks, Perspecsys (Blue Coat), Hitachi Sepaton VTL, CSC ServiceMesh, Netskope
- Databases: MS SQL Server (EKM), Oracle (TDE), IBM DB2, Oracle MySQL, Oracle Database, Teradata
- File and disk encryption: PKware, MongoDB
- Identity management: Centrify Privilege Service
- Key managers: Hadoop KMS, CloudEra Navigator Key Trustee Server
- Physical storage: NetApp NSE, Dell Compellent (SC and XC), HPE MSL/ESL Tape Libraries, HPE 3Par StoreServ, HPE XP7, Hitachi VSP, Hitachi HUS, Hitachi RAID700, IBM XIV SED, Quantum Scalar Series(i6000, i500 & i40/80),Viasat, Brocade FS8-18.
HSM certifications
- Common Criteria EAL4+ compliant with CWA 14167-2 PP
- FIPS 140-2 Level 3 (in progress)
- EU RESTRICTED
- NATO SECRET
- Qualification Renforcée (the highest qualification from the ANSSI)
- Compliant with eIDAS
Cryptographic characteristics
- Max keys:: 1,000,000
- Max concurrent clients per cluster: 1,000
- HSM integration: Yes
Authentication
- LDAP and Active Directory
API support
- Java
- C/C++
- Net XML open interface
- KMIP standard
Appliance administration
- Secure web-based GUI, command line Interface
Monitoring
- SNMP (v1, v2, and v3), NTP, URL health check, signed secure logs and syslog, automatic log rotation, secured encrypted and integrity checked backups and upgrades, extensive statistics
Trustway DataProtect offers a comprehensive data protection solution to guarantee data security and control over data access.
This solution provides the tools and capabilities to encrypt all data formats, such as virtual machines, databases, file systems, applications and tokenization. Trustway DataProtect is a complete solution for cloud, virtual and on-premises infrastructures and is compliant with the most restrictive data privacy regulations such as GDPR, HIPAA and PCI DSS.
Trustway DataProtect DB >>
Connected to Trustway DataProtect KMS, Trustway DataProtect DB provides your organization with total database protection in the data center and the cloud, thanks to centralized control and a regular key rotation. You directly select which data fields to encrypt.
Trustway DataProtect App >>
Connected to Trustway DataProtect KMS, Trustway DataProtect App is a highly-secure application encryption solution which centralizes administration of application encryption policy and keys. This solution is suitable for a wide range of web application servers and enterprise applications.
Trustway DataProtect VM >>
Connected to Trustway DataProtect KMS, Trustway DataProtect VM brings a complete cloud data protection which guarantees to your organization a secure migration to the cloud, ensures only authorized users to access information, and meets compliance mandates. With this solution, you can now isolate and totally control your virtual machine instances.
Trustway DataProtect File >>
Connected to Trustway DataProtect KMS, Trustway DataProtect File ensures data security, denying unauthorized user access to your files through fully automated file encryption of unstructured data contained in network drives and file servers.
Trustway DataProtect Token >>
Connected to Trustway DataProtect KMS, the Trustway DataProtect Token solution protects sensitive information by replacing it with a surrogate value that preserves the length and format of the original data. This solution can be deployed across cloud, virtual and on-premises environments to secure data such as credit cards, social security numbers, etc.
Related resources
Factsheet
Trustway DataProtect KMS: A complete key management and data encryption platform
Trustway DataProtect KMS is a centralized key management platform enhanced with data access control and monitoring features.
Brochure
Download: Securing your end-to-end infrastructure with unified encryption
Discover Trustway DataProtect, a data protection solution that secures your data, regardless of the location — whether stored in a database, file server, application, traditional or virtualized data center, or public cloud environment.
White paper
Download: Prevent ransomware attacks from taking down your business and defend your data
Drastic emergency situations provide a conducive environment for criminals to perform cyberattacks. Ransomware attacks today are clearly on the rise, and the risk of an organization’s sensitive data being stolen is higher. Read our white paper to learn more about ransomware and how to protect your sensitive data.
Brochure
Trustway HSM: Data Security – Choosing the right path through compliance
Compliant, flexible and innovative, our range of hardware security modules brings companies and critical infrastructures the reliability of an innovative and robust architecture in compliance with strict security demands.