Quantcast
Channel: Data Protection Support
Viewing all 551 articles
Browse latest View live

SafeNet MobilePASS for iOS 8.4.11 and SafeNet MobilePASS for Android 8.4.4 – Release Announcement

$
0
0

We are pleased to announce the release of SafeNet MobilePASS for iOS 8.4.11 and SafeNet MobilePASS for Android 8.4.4.

 SafeNet MobilePASS for iOS 8.4.11

This version features the following:

  • Improvements for iOS 13
  • VoiceOver support
  • UI improvements on iPhone 8+ devices

Version Download: App Store, KB0020530

SafeNet MobilePASS for Android 8.4.4

This version features the following:

  • Android 10 support
  • Accessibility narrator support for keypad

Version download: Google Play, KB0020531


SafeNet Authentication Service PCE/SPE v 3.10.0 – Release announcement

$
0
0

We are pleased to announce the release SafeNet Authentication Service PCE/SPE v 3.10.0 (SAS PCE)

This version features the following:

  • Support for Windows Server 2019 Operating System
  • FIPS support in SAS

SafeNet Authentication Service PCE/SPE v 3.10.0 is available for download from Thales Customer Portal: KB0020547

SafeNet MobilePASS+ for Windows v1.8.1 – Release Update

$
0
0

We are pleased to announce the release of  SafeNet MobilePASS+ for Windows v1.8.1.

This new version features:

  • App Store review dialog
  • Known issues

SafeNet MobilePASS+ for Windows v1.8.1 can be downloaded from  Windows Store, or from Thales Customer Support Portal:  EXE – KB0020566, APPX – KB0020567

 

Product Change Notice: Crypto Command Center

$
0
0

Thales Crypto Command Center continues to evolve, adding new features and enhancements in order for Enterprises to centrally manage Luna Network Hardware Security Modules (HSMs).

New to the platform:

  • Ability for administrators to view the health and status of clients connecting to the HSM;
  • Application Owners can view monitoring data, charts and graphs for services in their group including performance and number of decrypt operations;
  • Setting notifications based on usage sensitivity thresholds; and
  • Improvements to the UX.

Now that SafeNet Crypto Command Center version 3.6 is available, Thales is announcing the end-of-sale and support for versions 3.3, 3.4 and 3.5 as per the timelines listed in Table 1. To ease your migration efforts, please refer to Table 2 below.

Table 1: EoS Milestones and Dates

Milestone Date Impact
Announcement December 9, 2019 End of sale and support announcement.
End of Sale December 9, 2019 As of this date, Crypto Command Center 3.6 is the only version available.
End of Support June 9, 2020 Technical support, security updates, and software maintenance cease. Please contact your Thales representative with any concerns.

Table 2: Affected Part Numbers and Migration Path

Legacy Product Legacy Part # New Description New Part #
SW,ELEC DELIVERY, PREMIUM, CRYPTO CMD CTR,V3.3 908-000266-007 SW,ELEC DELIVERY, PREMIUM, CRYPTO CMD CTR,V3.6 908-000266-010
SW,SERVER,FREEMIUM,CRYPTO CMD CTR,V3.3 610-012892-007
SW,ELEC DELIVERY, PREMIUM, CRYPTO CMD CTR,V3.4 908-000266-008
SW,SERVER,FREEMIUM,CRYPTO CMD CTR,V3.4 610-012892-008
SW,ELEC DELIVERY, PREMIUM, CRYPTO CMD CTR,V3.5 908-000266-009

 

*Please note: as of Crypto Command Center version 3.5, Thales no longer offers separate Premium and Freemium releases. For the Freemium license version 3.5 or higher, use the Premium download and apply the Freemium license included in the package.

Resources

The following documentation is available to guide you through the migration process from Crypto Command Center 3.3, 3.4 and 3.5 to 3.6:

Description Knowledge Base Document ID/Link
Crypto Command Center 3.6 Customer Release Notes (CRN) (#007-012333-008) DOW0004150
Crypto Command Center 3.6 Download

 

DOW0004148
Crypto Command Center Main Navigation Website Page Click here
Support Portal Click here

 

Supported Luna HSM Versions

Crypto Command Center 3.6 supports the following versions of Luna Network HSMs:

  • 6.x, 7.0, 7.1, 7.2, 7.3
  • REST API is required
  • 6.2.2 with firmware 6.10.9 or 6.24.3 (6.10.9 recommended for FIPS compliance)
  • 6.3 with firmware 6.10.9 & 6.27.0
  • 7.0 Or 7.1 with (firmware 7.0.1, 7.0.2 & 7.1.0), 7.2, 7.3, & 7.4.

Contact

Should you have any questions please contact your Thales representative.

Universal Client v10.1 Now Available for Data Protection On Demand (DPoD) and Luna

$
0
0

We’re excited to announce that the Universal Client v 10.1 is now available, providing the following benefits:

  • Hybrid Support:
    • Deploy a single client to support both our on-premises and cloud-based HSMs
    • Clone keys between Luna HSMs and DPoD
    • Securely backup and restore HSM key material between Luna HSMs, DPoD, and Luna Backup HSMs with automatic key replication
    • 3rd Party HSM integrations working with both Luna HSMs and HSM on Demand Services
  • Luna HSM:
    • 3rd Party Client Signed Certificates – Luna Client NTLS certificates can now be signed by a 3rd party or internal certificate authority (CA)
    • Windows Server Secure Boot Enhancements: drivers are now signed by Microsoft to help prevent malicious software applications and unauthorized operating systems from loading during the system start-up process
    • Remote PED on Linux: remotely provision a Luna HSM using a Linux operating system (previously only available on Windows)

Downloads:

  • Universal Client 10.1 replaces the existing Luna HSM 7.5 Client and is available on the support portal
  • Please note that version 7.5 is no longer available for download, and the new Luna Backup HSM support introduced in 7.5 is also available in the 10.1 release
  • All DPoD tenants are asked to upgrade to the latest client before the end of the year

 

Download Links:

Download Links KB Article # Notes
SafeNet Luna HSM Client 10.1 for Windows KB0020224 Windows client software for SafeNet Luna HSM 10.1 – Network and PCIe.  Includes Client Software, Drivers, PED, Backup HSM.
SafeNet Luna HSM Client 10.1 for Linux KB0020225 Linux client software for SafeNet Luna HSM 10.1 – Network and PCIe.  Includes Client Software, Drivers, PED, Backup HSM.
SafeNet Luna HSM Client 10.1 for Solaris Sparc KB0020226 Solaris Sparc client software for SafeNet Luna HSM 7.4 – Network and PCIe.  Includes Client Software, Drivers, PED, Backup HSM.
SafeNet Luna HSM Client 10.1 for AIX KB0020227 AIX client software for SafeNet Luna HSM 7.4 – Network and PCIe. Includes Client Software, Drivers, PED, Backup HSM.
SafeNet Luna HSM Client 10.1 for Solaris x86 KB0020229 Solaris x86 client software for SafeNet Luna HSM 7.4 – Network and PCIe. Includes Client Software, Drivers, PED, Backup HSM.
SafeNet Luna HSM Minimal Client 10.1 for Linux KB0020230 Linux minimal client software for SafeNet Luna HSM 7.4 – Network and PCIe. Includes Client Software, Drivers, PED, Backup HSM.
SafeNet Luna HSM Universal Client 10.1 Documentation KB0020231 Product documentation for SafeNet Luna Universal Client 10.1 release for Network HSM. This includes HTML and PDF documents.
Universal Client 10.1 for Network HSM Customer Release Notes (CRN) KB0020232 Release notes for Universal Client 10.1 release for Network HSM.
SafeNet Luna PCIE HSM Universal Client 10.1 Documentation KB0020233 Product documentation for SafeNet Luna Universal Client 10.1 release for PCI-E HSM. This includes HTML and PDF documents.
Universal Client 10.1 for PCIE HSM Customer Release Notes (CRN) KB0020234 Release notes for Universal Client 10.1 release for PCI-E HSM.

 

Questions? Contact your Thales Representative.

ProtectServer ProtectToolkit 5.9 Released

$
0
0

Thales/Gemalto is very pleased to announce the release of ProtectToolkit 5.9. This release, compatible with all ProtectServer 2 models, provides the following new features and enhancements:

CTMULTITOKEN

SafeNet ProtectToolkit 5.9 includes ctmultitoken, a multi-threaded performance testing tool (which will eventually replace the single-threaded CTPerf tool) that allows you to perform basic cryptographic functions on a ProtectServerHSM. Designed as a testing tool for HSM operations and performance, ctmultitoken allows you to specify one or more tokens on which to perform or repeat an operation, and returns a summary of the results.

Key Creation From Multiple Components and Multi-Custodian Backup/Restore Allowed in FIPS Mode

A new mechanism, CKM_PP_LOAD_SECRET_2, allows you to import keys from multiple components and backup/restore multi-custodian keys without requiring the WeakPKCS#11Mechanisms flag to be set. These operations are now supported in FIPS mode.

MIBs for SNMP Logging Enhancements

SafeNet ProtectToolkit 5.9 includes Management Information Base files(MIBs) that enable you to retrieve information about the ProtectServer Network HSM via SNMP. New TUAK and KECCAK Mechanisms SafeNet ProtectToolkit 5.9 includes new mechanisms for using the TUAK and KECCAK cryptographic algorithms, used for 5G mobile ethernet systems.

New PSESH Commands Display HSM Information and Allow Audit Log Cleanup

New PSESH commands allow the following functions:

  • audit log clear: allows the audit user to delete all current audit logs on the HSM.
  • syslog cleanup: allows the admin user to create a .tar archive of all audit logs currently on the HSM, and delete them.
  • hsm show: displays information about the appliance image/HSM firmware versions, slot information, and admin token information.

Please go to the Gemalto Support Portal**to download the release notes – details as follows:

Release notes – Knowledge Base Article DOW0004477/KB0020597
PTK 5.9 Software (PTK-C;PTK-J;PTK-M) – Doc ID: DOW0004478/KB0020598
Firmware 5.00.06 – Doc ID: DOW0004480/KB0020600
PTK 5.9 Documentation – Doc ID: DOW0004479/KB0020599
ProtectServer External appliance upgrade – Doc ID: DOW0004481/KB0020601

**Log in required. Contact CustomerPortalSupport@Gemalto.com for assistance.

End-of-Sale Notification: SafeNet Authentication Manager (SAM) PKI Use cases

$
0
0
As of June 30, 2020 we are planning to stop sales of SafeNet Authentication Manager for PKI use cases support.

Key dates in the End of Sale process

Milestone Date                     Comment
LAST-TIME-BUY (LTB) of SAM Support June 29, 2020  

Support contracts purchased up until 30th June 2020 cannot extend beyond 30th June 2021.

END-OF-SALES (EOS) Effective June 30, 2020
END-OF-SUPPORT June 30, 2021  
END-OF-LIFE (EOL) Effective June 30, 2021  

Replacement Product

SAM PKI certificate management will be replaced by Versasec’s vSec credential management solution. Thales is a reseller of this solution and will handle all sales of vSec.

For details please refer to the End of Life Announcement.

End-of-Sale Notification: SafeNet Network Logon (SNL)

$
0
0

As part of our ongoing product communication, we are announcing End-of-Sale for SafeNet Network Logon (SNL).

The following are key dates in the End of Sale process:

Milestone Date
LAST-TIME-BUY (LTB) July 29, 2020
END-OF-SALES (EOS) July 30, 2020
END-OF-LIFE (EOL) July 30, 2021

 

For details please refer to the End of Life Announcement.


End of Life Reminder – ProtectServer 1 Product Family

$
0
0

Gemalto/Thales would like to remind you that the previous-generation ProtectServer Internal Express and ProtectServer External products are now end of life.

As announced on 4th June 2014, the ProtectServer 1 product family became end of sale on 4th December 2014. These products have now reached full end of life and support status.
Customers still using the ProtectServer Internal Express or ProtectServer External products listed below should consider migrating to the ProtectServer 2 product family.

 

End-of-Life Part Number

Description
934-000007-001 PSI-E SFF,PL25,FW3.00.03,ROHS
934-000008-001 PSI-E SFF,PL220,FW3.00.03,ROHS
934-000009-001 PSI-E SFF,PL600,FW3.00.03,ROHS
934-000010-001 PSI-E SFF,TOOLKIT V4.00.00,PL25,FW3.00.03,ROHS
934-000011-001 PSI-E SFF,TOOLKIT V4.00.00,PL220,FW3.00.03,ROHS
934-000012-001 PSI-E SFF,TOOLKIT V4.00.00,PL600,FW3.00.03,ROHS
934-000009-002 PSI-E SFF,PL600,FW3.10.02,ROHS
934-000008-002 PSI-E SFF,PL220,FW3.10.02,ROHS
934-000007-002 PSI-E SFF,PL25,FW3.10.02,ROHS
934-000007-003 PSI-E SFF,PL25,FW3.10.05,ROHS
934-000010-003 PSI-E SFF,TOOLKIT V4.1.1,PL25,FW3.10.05,ROHS
934-000008-003 PSI-E SFF,PL220,FW3.10.05,ROHS
934-000011-003 PSI-E SFF,TOOLKIT V4.1.1,PL220,FW3.10.05,ROHS
934-000009-003 PSI-E SFF,PL600,FW3.10.05,ROHS
934-000012-003 PSI-E SFF,TOOLKIT V4.1.1,PL600,FW3.10.05,ROHS
934-000007-004 PSI-E SFF,PL25,FW3.11.02,ROHS
934-000008-004 PSI-E SFF,PL220,FW3.11.02,ROHS
934-000009-004 PSI-E SFF,PL600,FW3.11.02,ROHS
934-000010-004 PSI-E SFF,TOOLKIT V4.1.1,PL25,FW3.11.02,ROHS
934-000011-004 PSI-E SFF,TOOLKIT V4.1.1,PL220,FW3.11.02,ROHS
934-000012-004 PSI-E SFF,TOOLKIT V4.1.1,PL600,FW3.11.02,ROHS
934-000007-005 PSI-E SFF,PL25,FW3.20.00,ROHS
934-000008-005 PSI-E SFF,PL220,FW3.20.00,ROHS
934-000009-005 PSI-E SFF,PL600,FW3.20.00,ROHS
934-000010-005 PSI-E SFF,TOOLKIT V4.2,PL25,FW3.20.00,ROHS
934-000011-005 PSI-E SFF,TOOLKIT V4.2,PL220,FW3.20.00,ROHS
934-000012-005 PSI-E SFF,TOOLKIT V4.2,PL600,FW3.20.00,ROHS
934-000011-006 PSI-E SFF,TOOLKIT V4.3,PL220,FW3.20.00/3.20.03
934-000010-006 PSI-E SFF,TOOLKIT V4.3,PL25,FW3.20.00/3.20.03
934-000012-006 PSI-E SFF,TOOLKIT V4.3,PL600,FW3.20.00/3.20.03
934-000056-001 PSE V4.2,PL25,FW3.20.00,ROHS
934-000057-001 PSE V4.2,TOOLKIT V4.2,PL25,FW3.20.00,ROHS
934-000062-001 PSE V4.2,PL220,FW3.20.00,ROHS
934-000063-001 PSE V4.2,TOOLKIT V4.2,PL220,FW3.20.00,ROHS
934-000064-001 PSE V4.2,PL600,FW3.20.00,ROHS
934-000065-001 PSE V4.2,TOOLKIT V4.2,PL600,FW3.20.00,ROHS
934-000057-002 PSE V4.3,TOOLKIT V4.3,PL25,FW3.20.00,ROHS
934-000063-002 PSE V4.3,TOOLKIT V4.3,PL220,FW3.20.00,ROHS
934-000065-002 PSE V4.3,TOOLKIT V4.3,PL600,FW3.20.00,ROHS
934-000056-002 PSE V4.3.1,PL25,FW3.20.00
934-000062-002 PSE V4.3.1,PL220,FW3.20.00
934-000064-002 PSE V4.3.1,PL600,FW3.20.00
934-000979-001 PROTECTTOOLKIT EFT

SafeNet Agent for ADFS v 2.41 – Release Update

$
0
0

We would like to inform you that the SafeNet Agent for Active Directory Federation Services (AD FS) v.2.41 is now available.

This new version features the following enhancement:

The SafeNet Agent for AD FS now successfully facilitates iPhone users’ login to Office365 with the PUSH authentication while using multiple ADFS server and farm configurations on the agent.

Installation and configuration instructions, along with the agent itself, can be downloaded from the Thales Customer Portal : KB0020865

 

SafeNet Authentication Client (SAC) 10.2 for Mac (Post GA R2) – Release Announcement

$
0
0

We would like to announce the release of SafeNet Authentication Client (SAC) version 10.2 for Mac (Post GA R2).

This version resolves known issues and features the following:

  • Support for MacOS 10.15 Catalina
  • Apple Notarization support

SAC 10.2 for Mac (Post GA R2) is now available for download from the Customer Support Portal KB0021012.

Product Release: Thales Luna EFT Payment HSM version 2.4.0

$
0
0

Thales is pleased to announce the release of version 2.4.0 of the Luna EFT Payment HSM.

This release of Luna EFT Payment HSM introduces key features expanding the HSM’s capabilities in terms of key management, backup and enhancement of the latest payment standards. This includes:

RSA Key Block Support
Below host functions are updated to generate RSA key block in Key Spec Format 18 as per TR-31:2018:

  • GENERATE-RSA-KEY-PAIR (EE9001)
  • IMPORT-PUBLIC-KEY (EE9003)

Below host functions are updated to support RSA key block in Key Spec Format 18:

    • SIGN-DATA (EE9005)
    • VERIFY-SIGNED-DATA (EE9006)
    • PUBLIC-KEY-OPERATIONS (EE9009)
    • PRIVATE-KEY-OPERATIONS (EE9010)
    • KEY-RETRIEVE-OPERATION (EE9012)

AES KTPV Support in OBM Host Functions
Below host functions are updated to support 256 bit AES KTPV:

  • OBM-SET-PIN (EE3004)
  • OBM-VERIFY-PIN-HASH (EE3005)
  • OBM-CHANGE-PIN-HASH (EE3006)
  • OBM-PRINT-PIN (EE3008)
  • OBM-MIGRATE-PIN-3624-TPV (EE3009)
  • OBM-GENERATE-RANDOM-PIN (EE3017)
  • OBM-PRINT-ENCRYPTED-PIN (EE3018)
  • OBM-SET-PIN-TPV (EE3020)

Union Pay International (UPI) Enhancements
Below host functions are updated to support transaction processing for UPI scheme:

  • EMV-VERIFY-AC-GEN-ARPC (EE2018)
  • EMV-AC-GEN-MULTI (EE2019)
  • EMV-SCRIPT-CRYPTO-MULTI (EE2020)
  • EMV-PIN-CHANGE-UNBLOCK-MULTI (EE2021)

AMB Host Keys
Key management for the 27 AMB host keys has been merged.

Network Key Transfer on Luna EFT Web Console
NKT transfer page is added to enable import and export of Network Key Transfer package on the Luna EFT web console.

Console Enhancements

Lush

Added Lush Commands

Below is a new Lush command added:

  • List/Delete audit log files: This command is used to list/delete audit log files uploaded on HSM for an audit user

Updated Lush Commands

  • View KVC: View KVC command is updated to display Audit MAC key status.
  • Delete Key: Delete key Lush command is updated to delete KTP key.
  • Key management command: Key management command is updated to generate, view, delete, backup and restore AES 256 bit KTPV key.

Web Console

  • Partition restart option: A new button is added to restart a partition after SSL and host services configuration on the Luna EFT web console under the Partition Owner role. This enables Partition Owner to restart the partition after configuring all the settings.
  • Content update: MDC-2 is renamed as HASH_ISO_10118 on the KCV View page.

Other Enhancements

  • Host Functions Update
      • RTMK-4500 (4500): This host function is updated to support encrypted session keys (KMACr, KPEr and KDr) in the request field as optional.
  • KM-MIGRATE (12): This host function is updated to support Key Spec format 15 

OpenSSL Version Update

  • OpenSSL version is updated to 1.1.1d.

NTP Version Update

  • NTP version is updated from 4.2.8p12 to 4.2.8p13.

Please go to the Customer Support Portal* to download the EFT 2.4.0 Software Release and the Customer Release Notes (use Document Number: KB0020981).

*Log in required.  Contact technical.support.DIS@thalesgroup.com  for assistance.

Thales GP HSM Documentation Portal Now Open

$
0
0

Thales is excited to introduce a new and improved way for customers and partners to access Thales HSM product documentation for Luna HSMs, ProtectServer HSMs and Crypto Command Center.

The online Thales GP HSM Documentation Portal is available 24/7, optimized for all devices (desktop, laptop, tablet, phone), and no login is required.

End of Support Announcement for ProtectV

$
0
0

This is to announce the end-of-support dates for SafeNet ProtectV™ software releases. Customers are encouraged to transition to the latest version of SafeNet ProtectV™ for continued full disk encryption of physical servers, virtual machines, and cloud instances to securely run sensitive workloads.

Table 1: EoS Milestone Impact/Definition  

Milestone Impact/Definition
Release Date Original release date of general availability of product. Products may be further developed to include new functionality, improvement of existing functionality, enhancement that provides additional value and/or extended performance, and any other change that constitutes an upgrade to the product (collectively: “New Features”, as well as for the purpose of implementing new platforms and bug fixes.
End of Development During the End of Development stage, a specific version of a product may be available for new installations; however, new updates will no longer be made to that version of the product. These versions of the products will no longer be promoted. Bug fixes are evaluated on a case-by-case basis. Customers with existing deployments of product versions in this phase may still be eligible for Client Services support (mainly for troubleshooting and workarounds). Customers can also purchase Professional Services support (if applicable), but no additional investment will be made by development and engineering departments.
End of Life (EOL)/End of Support (EOS) EOL/EOS defines a product that is no longer available for purchase and will no longer be supported by IDP. EOL is the final stage in the overall process. Once a product has been classified as “EOL”, there is no development (including bug fixes), there is no repair or replacement support, and Technical Support may be limited to online documentation (knowledge-base) and downloads. Customers are required to upgrade to a current product version to obtain support.

 

Table 2: Product Versions and Corresponding EoS Milestone Deadlines 

(login for portal required)

ProtectV Version Release Date End of Development End of Support
4.8.0 04-Jun-19 14-Jan-20 13-Jan-21
4.7.5 25-Jan-19 04-Oct-19 03-Oct-20
4.7.3 08-Jul-19 04-Jun-19 03-Jun-20
4.7.0 21-Dec-18 25-Jan-19 25-Jan-20
4.6.0 27-Aug-18 08-Jul-19 07-Jul-20
4.5.1 18-Jul-18 21-Dec-18 21-Dec-19
4.5.0 17-May-18 27-Aug-18 27-Aug-19
4.4.1 05-Mar-18 18-Jul-18 18-Jul-19
4.3.0 16-Oct-17 17-May-18 17-May-19
4.2.0 24-Jul-17 05-Mar-18 05-Mar-19
4.1.1 23-May-17 16-Oct-17 16-Oct-18

 

Customers are recommended to upgrade to below or higher version of SafeNet ProtectV in order to continue using the latest and supported SafeNet ProtectV releases:

Questions?

Please contact your Gemalto Sales Representative or see the Thales Technical Support Centre page for more information (log-in required).

End-of-Support Announcement for ProtectFile (Windows and Linux)

$
0
0

To continue improving file encryption capabilities and adhere to Thales software life cycle policy we are announcing end-of- support (“EoS”) for various previous versions of SafeNet ProtectFile. Please see the milestone descriptions and timelines, as well as products affected by this announcement and recommended migration paths in the tables below.

(Please note:  Log in for portal required to access links.)

Table 1: EoS Milestone Impact/Definition

Milestone Impact/Definition
Release Date Original release date of general availability of product. Products may be further developed to include new functionality, improvement of existing functionality, enhancement that provides additional value and/or extended performance, and any other change that constitutes an upgrade to the product (collectively: “New Features”, as well as for the purpose of implementing new platforms and bug fixes.
End of Development During the End of Development stage, a specific version of a product may be available for new installations; however, new updates will no longer be made to that version of the product. These versions of the products will no longer be promoted. Bug fixes are evaluated on a case-by-case basis. Customers with existing deployments of product versions in this phase may still be eligible for Client Services support (mainly for troubleshooting and workarounds). Customers can also purchase Professional Services support (if applicable), but no additional investment will be made by development and engineering departments.
End of Life (EOL)/End of Support (EOS) EOL/EOS defines a product that is no longer available for purchase and will no longer be supported by IDP. EOL is the final stage in the overall process. Once a product has been classified as “EOL”, there is no development (including bug fixes), there is no repair or replacement support, and Technical Support may be limited to online documentation (knowledge-base) and downloads. Customers are required to upgrade to a current product version to obtain support.

 

Table 2: Product Versions and Corresponding EoS Milestone Deadlines 

ProtectFile Linux Release Date End of Development End of Support
8.11.0 23-Aug-19 27-Dec-19 26-Dec-20
8.10.11 05-Jun-19 25-Oct-19 24-Oct-20
8.10.10 06-Mar-19 23-Aug-19 22-Aug-20
8.10.1 09-Apr-19 05-Jun-19 04-Jun-20
8.10.0 24-Sep-18 06-Mar-19 05-Mar-20
8.9.4 06-Dec-19 27-Dec-19 26-Dec-20
8.9.3 03-May-19 06-Dec-19 05-Dec-20

 

ProtectFile Windows Release Date End of Development End of Support
8.11.0 07-Jun-19 11-Feb-20 10-Feb-21
8.10.11 05-Jun-19 25-Oct-19 24-Oct-20
8.10.10 06-Mar-19 25-Oct-19 24-Oct-20
8.10.1 11-Jan-19 25-Oct-19 24-Oct-20

Customers are recommended to upgrade to below or higher version of SafeNet ProtectFile in order to continue using the latest and supported SafeNet ProtectFile releases:

Questions?

Please contact your Gemalto Sales Representative or see the Thales Technical Support Centre page for more information (log-in required).


End of Life/Sale Reminder: SafeNet Authentication Manager (SAM) OTP License & IDCore 3010 A&B

$
0
0

As part of our ongoing product update cycle, below are End-of-Life (EOL), End-of-Sale (EOS) reminders:

SafeNet Authentication Manager (SAM) OTP Licence

Effective as of May 31, 2020, SafeNet Authentication Manager (SAM) for OTP use cases will be End-of-Life (EOL).

For additional details please refer to the End-of-Sale announcement.

IDCore 3010A & IDCore 3010B

Effective as of May 31, 2020, we are planning to stop sales of IDCore 3010A and IDCore 3010B.

For additional details please refer to the End-of-Sale Announcement.

How to use the Luna HSM and DPoD Luna Cloud HSM Client with node.js

$
0
0

Interfacing with the Luna HSM and the Luna Cloud HSM service provided by DPoD requires a package called PKCS11js. The file index.d.ts provides a complete Javascript/Typescript API definition. A discussion of the full API is not presented here, however, index.d.ts is maintained by the pkcs11js author(s) and thus one should refer to it for any deficiencies or incompleteness in the use of the API here.

Graphene, also provides a simplistic (although proprietary) Object Oriented interface for interacting with PKCS#11 devices, for some people this is the right level to build on. However, in this example we wish to interact directly with the PKCS#11 API, so PKCS11js is the package to use.

PKCS#11 (also known as CryptoKI or PKCS11) is the standard interface for interacting with hardware crypto devices such as Smart Cards and Hardware Security Modules (HSMs) such as the SafeNet Luna and/or DPoD.

If you would like a 30 day free trial of DPoD please click here.

Installation of node, npm and pkcs11js

On linux, install node npm, then use npm to install the pkcs11js module. You can install these globally or locally within the folder tree of your specific application.

$ yum install node
$ yum install npm
$ npm install pkcs11js

The sample npm install command above is for a local installation. Consult npm help to install globally. Basically, you will need to run the following from the linux command line for each bash session or ensure the environment is set accordingly:

$ export NODE_PATH=`npm root -g`

Also, you will need to install a Luna or DPoD client. The location of the libcklog2.so or libCryptoki2.so libraries will be needed for the sample code below.

Examples

All examples are provided inline here as well as in separate files for download.

It is assumed the reader has a working knowledge of JavaScript.

PKCS#11 allows for the API to receive a null buffer and have the API return the required size, however, pkcs11js does not allow for this. One must provide the proper allocated buffer upon the first call or an error will be returned.

The examples are just that, examples. One should keep in mind that just because a sample gets slot or session info then that doesn’t imply you need to get that same info *unless* your application needs to use that info.

Also, sessions in PKCS#11 need to be explicitly managed by the application. Thus if you open a session and authenticate a r/w session by logging in then your app must track that session and what your app is doing with that session. The PKCS#11 spec does not require enforcement of automatic session management. If you open a session and login then your app should then logout and close that session after it is finished with those resources.

Example #1 – get all mechanisms from the Luna/DPoD partition

var pkcs11js = require("pkcs11js");

var pkcs11 = new pkcs11js.PKCS11();
pkcs11.load("<path_to_p11_library>/libcklog2.so");
//OR
pkcs11.load("<path_to_p11_library>/libCryptoki2.so");
//e.g.
pkcs11.load("/usr/safenet/lunaclient/lib/libCryptoki2_64.so");

pkcs11.C_Initialize();

try {
    // Getting info about PKCS11 Module
    var module_info = pkcs11.C_GetInfo();

    // Getting list of slots
    var slots = pkcs11.C_GetSlotList(true);
    var slot = slots[0];

    // Getting info about slot.  Do this if you need this info.
    var slot_info = pkcs11.C_GetSlotInfo(slot);
    // Getting info about token.  Do this if you need this info.
    var token_info = pkcs11.C_GetTokenInfo(slot);

    // Getting info about Mechanism.  Do this if you need this info.
    var mechs = pkcs11.C_GetMechanismList(slot);
    var mech_info = pkcs11.C_GetMechanismInfo(slot, mechs[0]);

    /**
    * Your app code here
    */
    console.log("mechs:", mechs);

}
catch(e){
    console.error(e);
}
finally {
    pkcs11.C_Finalize();
}

Example #2 – create an AES symmetric key

var pkcs11js = require("pkcs11js");

var pkcs11 = new pkcs11js.PKCS11();
pkcs11.load("<path_to_p11_library>/libcklog2.so");
//OR
pkcs11.load("<path_to_p11_library>/libCryptoki2.so");
//e.g.
pkcs11.load("/usr/safenet/lunaclient/lib/libCryptoki2_64.so");

pkcs11.C_Initialize();

try {
    // Getting info about PKCS11 Module.  Do this if you need this info.
    var module_info = pkcs11.C_GetInfo();

    // Getting list of slots
    var slots = pkcs11.C_GetSlotList(true);
    var slot = slots[0];

    //Sessions in PKCS#11 need to be explicitly managed by the application.  Thus if you open a session and
    //authenticate a r/w session by logging in then your app must track that session and what your app is
    //doing with that session.  The PKCS#11 spec does not require enforcement of automatic session management.
    //If you open a session and login then your app should then logout and close that session after it is
    //finished with those resources.
    var session = pkcs11.C_OpenSession(slot, pkcs11js.CKF_RW_SESSION | pkcs11js.CKF_SERIAL_SESSION);

    // Getting info about Session.  Do this if you *need* to use this info.
    var info = pkcs11.C_GetSessionInfo(session);
    pkcs11.C_Login(session, 1, "userpin");

    /**
    * Your app code here
    */
    var template = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_SECRET_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My AES Key" },
        { type: pkcs11js.CKA_VALUE_LEN, value: 256 / 8 },
        { type: pkcs11js.CKA_ENCRYPT, value: true },
        { type: pkcs11js.CKA_DECRYPT, value: true },
    ];
    var key = pkcs11.C_GenerateKey(session, { mechanism: pkcs11js.CKM_AES_KEY_GEN }, template);
        pkcs11.C_Logout(session);
        pkcs11.C_CloseSession(session);
    console.log("key handle:",key.toJSON());

}
catch(e){
    console.error(e);
}
finally {
    pkcs11.C_Finalize();
}

Example #3 – create an AES symmetric key and use it, via CBC mechanism, to encrypt and decrypt some data

var pkcs11js = require("pkcs11js");

var pkcs11 = new pkcs11js.PKCS11();
pkcs11.load("<path_to_p11_library>/libcklog2.so");
//OR
pkcs11.load("<path_to_p11_library>/libCryptoki2.so");
//e.g.
pkcs11.load("/usr/safenet/lunaclient/lib/libCryptoki2_64.so");

pkcs11.C_Initialize();

try {
    // Getting info about PKCS11 Module
    var module_info = pkcs11.C_GetInfo();

    // Getting list of slots
    var slots = pkcs11.C_GetSlotList(true);
    var slot = slots[0];
    console.log("slots:");
    var len = slots.length;

    for (var i = 0; i < len; i++) {
        var myObject = slots[i];
        console.log(myObject.toJSON());
    }

    //Sessions in PKCS#11 need to be explicitly managed by the application.  Thus if you open a session and
    //authenticate a r/w session by logging in then your app must track that session and what your app is
    //doing with that session.  The PKCS#11 spec does not require enforcement of automatic session management.
    //If you open a session and login then your app should then logout and close that session after it is
    //finished with those resources.
    var session = pkcs11.C_OpenSession(slot, pkcs11js.CKF_RW_SESSION | pkcs11js.CKF_SERIAL_SESSION);

    // Getting info about Session.  Do this if you *need* to use this info.
    var info = pkcs11.C_GetSessionInfo(session);
    console.log("slot: 0x" + slot.toString("hex"));
    console.log("session slot ID: 0x" + info.slotID.toString("hex"));
    console.log("session state:" + info.state);
    console.log("session flags:" + info.flags);
    console.log("session deviceError:" + info.deviceError);

    pkcs11.C_Login(session, 1, "userpin");

    /**
    * Your app code here
    */
    var template = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_SECRET_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My AES Key" },
        { type: pkcs11js.CKA_VALUE_LEN, value: 256 / 8 },
        { type: pkcs11js.CKA_ENCRYPT, value: true },
        { type: pkcs11js.CKA_DECRYPT, value: true },
    ];
    var secretKey = pkcs11.C_GenerateKey(session, { mechanism: pkcs11js.CKM_AES_KEY_GEN }, template);
    console.log("key handle:",secretKey.toJSON());

    var cbc_param = pkcs11.C_GenerateRandom(session, new Buffer(16), 16);

    pkcs11.C_EncryptInit(
        session,
        {
            mechanism: pkcs11js.CKM_AES_CBC,
            parameter: cbc_param
        },
        secretKey
    );

    var enc = new Buffer(0);
    enc = Buffer.concat([enc, pkcs11.C_EncryptUpdate(session, new Buffer("Incomming data 1"), new Buffer(16))]);
    enc = Buffer.concat([enc, pkcs11.C_EncryptUpdate(session, new Buffer("Incomming data N"), new Buffer(16))]);
    enc = Buffer.concat([enc, pkcs11.C_EncryptFinal(session, new Buffer(16))]);

    console.log("enc length:" + enc.length);
    console.log("0x" + enc.toString("hex"));

    pkcs11.C_DecryptInit(
        session,
        {
            mechanism: pkcs11js.CKM_AES_CBC,
            parameter: cbc_param
        },
        secretKey
    );

    var dec = new Buffer(0);
    dec = Buffer.concat([dec, pkcs11.C_DecryptUpdate(session, enc, new Buffer(32))]);
    dec = Buffer.concat([dec, pkcs11.C_DecryptFinal(session, new Buffer(16))]);

    console.log(dec.toString());
}
catch(e){
    console.error(e);
}
finally {
    pkcs11.C_Logout(session);
    pkcs11.C_CloseSession(session);
    pkcs11.C_Finalize();
}

Example #4 – create an AES symmetric key and use it, via GCM mechanism, to encrypt and decrypt some data

var pkcs11js = require("pkcs11js");

//what has been implemented in pkcs11js as of 2020-01-02
const MechParams = {
  AesCBC: 1,
  AesCCM: 2,
  AesGCM: 3,
  RsaOAEP: 4,
  RsaPSS: 5,
  EcDH: 6,
  AesGCMv240: 7,
}

var pkcs11 = new pkcs11js.PKCS11();
pkcs11.load("<path_to_p11_library>/libcklog2.so");
//OR
pkcs11.load("<path_to_p11_library>/libCryptoki2.so");
//e.g.
pkcs11.load("/usr/safenet/lunaclient/lib/libCryptoki2_64.so");

pkcs11.C_Initialize();

try {
    // Getting info about PKCS11 Module
    var module_info = pkcs11.C_GetInfo();

    // Getting list of slots
    var slots = pkcs11.C_GetSlotList(true);
    var slot = slots[0];

    //Sessions in PKCS#11 need to be explicitly managed by the application.  Thus if you open a session and
    //authenticate a r/w session by logging in then your app must track that session and what your app is
    //doing with that session.  The PKCS#11 spec does not require enforcement of automatic session management.
    //If you open a session and login then your app should then logout and close that session after it is
    //finished with those resources.
    var session = pkcs11.C_OpenSession(slot, pkcs11js.CKF_RW_SESSION | pkcs11js.CKF_SERIAL_SESSION);

    // Getting info about Session.  Do this if you *need* to use this info.
    var info = pkcs11.C_GetSessionInfo(session);
    console.log("slot: 0x" + slot.toString("hex"));
    console.log("session slot ID: 0x" + info.slotID.toString("hex"));
    console.log("session state:" + info.state);
    console.log("session flags:" + info.flags);
    console.log("session deviceError:" + info.deviceError);

    pkcs11.C_Login(session, 1, "userpin");

    /**
    * Your app code here
    */
    var template = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_SECRET_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My AES Key" },
        { type: pkcs11js.CKA_VALUE_LEN, value: 256 / 8 },
        { type: pkcs11js.CKA_ENCRYPT, value: true },
        { type: pkcs11js.CKA_DECRYPT, value: true },
    ];
    var secretKey = pkcs11.C_GenerateKey(session, { mechanism: pkcs11js.CKM_AES_KEY_GEN }, template);
    console.log("key handle:",secretKey.toJSON());

    //Find the object (key in this case) to use below
    var searchTemplate = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_SECRET_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My AES Key" },
    ];
    pkcs11.C_FindObjectsInit(session, searchTemplate);
    objects = pkcs11.C_FindObjects(session, 1);
    pkcs11.C_FindObjectsFinal(session);
    console.log("objects found:", objects.length);
    if ( objects.length == 1) {
      var foundKey = objects[0];
      console.log("objects found:", foundKey);
      //clobber generated key handle with found key handle
      secretKey = foundKey;
    }

    // Generate AES GCM parameters
    // Generate random IV and setup IV params
    var iv = pkcs11.C_GenerateRandom(session, new Buffer(12), 12);
    // Generate Additional Authentication Data(AAD) bytes
    var aad = new Buffer("AAAD");
    // Generate iv bits size
    var ivBits = 12*8;//96
    // Generate tag bits size
    var tagBits = 128;
    var type = MechParams.AesGCM;
    console.log("MechParams.AesGCM=",MechParams.AesGCM);
    var gcm_params = {
      iv,
      ivBits: iv.length * 8,
      aad: aad,
      tagBits,
      type,
    };

    pkcs11.C_EncryptInit(
        session,
        {
            mechanism: pkcs11js.CKM_AES_GCM,
            parameter: gcm_params
        },
        secretKey
    );

    var enc = new Buffer(0);
    enc = Buffer.concat([enc, pkcs11.C_EncryptUpdate(session, new Buffer("Incomming data 1"), new Buffer(0))]);
    enc = Buffer.concat([enc, pkcs11.C_EncryptUpdate(session, new Buffer("Incomming data N"), new Buffer(0))]);
    //AES CGCM is a special case in that the encrypt final, not encrypt update, is where the full buffer is required
    enc = Buffer.concat([enc, pkcs11.C_EncryptFinal(session, new Buffer(48))]);

    console.log("enc length:" + enc.length);
    console.log("0x" + enc.toString("hex"));

    pkcs11.C_DecryptInit(
        session,
        {
            mechanism: pkcs11js.CKM_AES_GCM,
            parameter: gcm_params
        },
        secretKey
    );

    var dec = new Buffer(0);
    dec = Buffer.concat([dec, pkcs11.C_DecryptUpdate(session, enc, new Buffer(32))]);
    dec = Buffer.concat([dec, pkcs11.C_DecryptFinal(session, new Buffer(32))]);

    console.log("dec length:" + dec.length);
    console.log(dec.toString());
}
catch(e){
    console.error(e);
}
finally {
    pkcs11.C_Logout(session);
    pkcs11.C_CloseSession(session);
    pkcs11.C_Finalize();
}

Example #5 – create an RSA asymmetric key pair and use it to sign and verify some data

var pkcs11js = require("pkcs11js");

var pkcs11 = new pkcs11js.PKCS11();
pkcs11.load("<path_to_p11_library>/libcklog2.so");
//OR
pkcs11.load("<path_to_p11_library>/libCryptoki2.so");
//e.g.
pkcs11.load("/usr/safenet/lunaclient/lib/libCryptoki2_64.so");

pkcs11.C_Initialize();

try {
    // Getting info about PKCS11 Module
    var module_info = pkcs11.C_GetInfo();

    // Getting list of slots
    var slots = pkcs11.C_GetSlotList(true);
    var slot = slots[0];

    //Sessions in PKCS#11 need to be explicitly managed by the application.  Thus if you open a session and
    //authenticate a r/w session by logging in then your app must track that session and what your app is
    //doing with that session.  The PKCS#11 spec does not require enforcement of automatic session management.
    //If you open a session and login then your app should then logout and close that session after it is
    //finished with those resources.
    var session = pkcs11.C_OpenSession(slot, pkcs11js.CKF_RW_SESSION | pkcs11js.CKF_SERIAL_SESSION);

    // Getting info about Session.  Do this if you *need* to use this info.
    var info = pkcs11.C_GetSessionInfo(session);
    console.log("slot: 0x" + slot.toString("hex"));
    console.log("session slot ID: 0x" + info.slotID.toString("hex"));
    console.log("session state:" + info.state);
    console.log("session flags:" + info.flags);
    console.log("session deviceError:" + info.deviceError);

    pkcs11.C_Login(session, 1, "userpin");

    /**
    * Your app code here
    */
    var publicKeyTemplate = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_PUBLIC_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My RSA Public Key" },
        { type: pkcs11js.CKA_PUBLIC_EXPONENT, value: new Buffer([1, 0, 1]) },
        { type: pkcs11js.CKA_MODULUS_BITS, value: 2048 },
        { type: pkcs11js.CKA_VERIFY, value: true }
    ];
    var privateKeyTemplate = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_PRIVATE_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My RSA Private Key" },
        { type: pkcs11js.CKA_SIGN, value: true },
    ];
    var keys = pkcs11.C_GenerateKeyPair(session, { mechanism: pkcs11js.CKM_RSA_PKCS_KEY_PAIR_GEN }, publicKeyTemplate, privateKeyTemplate);

    pkcs11.C_SignInit(session, { mechanism: pkcs11js.CKM_SHA256_RSA_PKCS }, keys.privateKey);

    pkcs11.C_SignUpdate(session, new Buffer("Incomming message 1"));
    pkcs11.C_SignUpdate(session, new Buffer("Incomming message N"));

    var signature = pkcs11.C_SignFinal(session, Buffer(256));


    pkcs11.C_VerifyInit(session, { mechanism: pkcs11js.CKM_SHA256_RSA_PKCS }, keys.publicKey);

    pkcs11.C_VerifyUpdate(session, new Buffer("Incomming message 1"));
    pkcs11.C_VerifyUpdate(session, new Buffer("Incomming message N"));

    var verify = pkcs11.C_VerifyFinal(session, signature);

}
catch(e){
    console.error(e);
}
finally {
    pkcs11.C_Logout(session);
    pkcs11.C_CloseSession(session);
    pkcs11.C_Finalize();
}

Example #6 – create an EC asymmetric key pair and use it to sign and verify some data

var pkcs11js = require("pkcs11js");

var pkcs11 = new pkcs11js.PKCS11();
pkcs11.load("<path_to_p11_library>/libcklog2.so");
//OR
pkcs11.load("<path_to_p11_library>/libCryptoki2.so");
//e.g.
pkcs11.load("/usr/safenet/lunaclient/lib/libCryptoki2_64.so");

pkcs11.C_Initialize();

try {
    // Getting info about PKCS11 Module
    var module_info = pkcs11.C_GetInfo();

    // Getting list of slots
    var slots = pkcs11.C_GetSlotList(true);
    var slot = slots[0];

    //Sessions in PKCS#11 need to be explicitly managed by the application.  Thus if you open a session and
    //authenticate a r/w session by logging in then your app must track that session and what your app is
    //doing with that session.  The PKCS#11 spec does not require enforcement of automatic session management.
    //If you open a session and login then your app should then logout and close that session after it is
    //finished with those resources.
    var session = pkcs11.C_OpenSession(slot, pkcs11js.CKF_RW_SESSION | pkcs11js.CKF_SERIAL_SESSION);

    // Getting info about Session.  Do this if you *need* to use this info.
    var info = pkcs11.C_GetSessionInfo(session);
    console.log("slot: 0x" + slot.toString("hex"));
    console.log("session slot ID: 0x" + info.slotID.toString("hex"));
    console.log("session state:" + info.state);
    console.log("session flags:" + info.flags);
    console.log("session deviceError:" + info.deviceError);

    pkcs11.C_Login(session, 1, "userpin");

    /**
    * Your app code here
    */
    var publicKeyTemplate = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_PUBLIC_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My EC Public Key" },
        { type: pkcs11js.CKA_EC_PARAMS, value: new Buffer("06082A8648CE3D030107", "hex") }, // secp256r1
        { type: pkcs11js.CKA_VERIFY, value: true },
    ];
    var privateKeyTemplate = [
        { type: pkcs11js.CKA_CLASS, value: pkcs11js.CKO_PRIVATE_KEY },
        { type: pkcs11js.CKA_TOKEN, value: false },
        { type: pkcs11js.CKA_LABEL, value: "My EC Private Key" },
        { type: pkcs11js.CKA_DERIVE, value: true },
        { type: pkcs11js.CKA_SIGN, value: true },
    ];
    var keys = pkcs11.C_GenerateKeyPair(session, { mechanism: pkcs11js.CKM_EC_KEY_PAIR_GEN }, publicKeyTemplate, privateKeyTemplate);

    pkcs11.C_SignInit(session, { mechanism: pkcs11js.CKM_ECDSA }, keys.privateKey);

    pkcs11.C_SignUpdate(session, new Buffer("Incomming message 1"));
    pkcs11.C_SignUpdate(session, new Buffer("Incomming message N"));

    var signature = pkcs11.C_SignFinal(session, Buffer(256));

    pkcs11.C_VerifyInit(session, { mechanism: pkcs11js.CKM_ECDSA }, keys.publicKey);

    pkcs11.C_VerifyUpdate(session, new Buffer("Incomming message 1"));
    pkcs11.C_VerifyUpdate(session, new Buffer("Incomming message N"));

    var verify = pkcs11.C_VerifyFinal(session, signature);

}
catch(e){
    console.error(e);
}
finally {
    pkcs11.C_Logout(session);
    pkcs11.C_CloseSession(session);
    pkcs11.C_Finalize();
}

Luna HSM 5/6 and Java HSM 3.x Now End of Sale

New Partner Tiles in DPoD Marketplace

$
0
0

Thales is pleased to announce the introduction of additional tiles to the DPoD Marketplace.
Partner tiles provide direct links to Thales Partners who offer solutions integrated with the DPoD platform.

Newly Introduced Tiles

Keyfactor Code Assure
Keyfactor Code Assure centralizes code signing operations into a single intuitive platform. Developers can have the freedom to quickly sign any code, from anywhere, while keys remain locked in a secure vault.

Keyfactor Control
Keyfactor Control makes it easy and affordable to embed high-assurance secure identity into every step of the IoT device lifecycle. Through design, manufacturing, deployment and ongoing management, Keyfactor Control provides the identity foundation you need to produce and sustain the most secure devices on the market – giving you the freedom to design great products and the confidence that they’ll deploy and remain secure throughout their use.

Keyfactor Command
Secure digital identity for the entire enterprise
Keyfactor Command is the world’s most complete and scalable cloud-based certificate management platform, providing the freedom to secure every identity across the enterprise. Get all the benefits of owning PKI without the risks. Absolutely, positively need to run it yourself? Keyfactor Command is also available for client-hosted environments.

End-of-Sale for SafeNet Multi-Link Encryptor CN8000

$
0
0
Thales is announcing End-of-Sale and Last Time Buy opportunities for the SafeNet Multi-Link Encryptor CN8000.

We encourage customers to transition to the Thales CN6140 Multi-link Network Encryptor (CN6140) or the Thales CN9120 Network Encryptor (CN9120). These best-in-class high-assurance high speed encryption solutions provide maximum security and performance, and are certified to the highest security standards. The CN6140 is a multi-port (1 or 10 Gbps), high-assurance encryptor designed to provide up to 40 Gbps aggregate, full line rate transparent encryption for all voice, video, and data communications moving across dark fibre, and metro or wide area Ethernet networks (MAN or WAN).

Transforming the network encryption market, Thales High Speed Encryptors (HSE) are the first to offer Transport Independent Mode (TIM) operation.  TIM delivers network independent encryption and the ability to encrypt traffic flows at Layers 2, 3 and 4 simultaneously across any kind of network infrastructure.

Thales network encryption solutions ensure the most secure data-in-motion protection, maximum performance, near-zero overhead with “set and forget” management, and lowest total cost of ownership.

Limited quantities remain; products are available on a first-come, first-served basis.
Maintenance will be available for renewal through December 31, 2021.

Encryptor for End-of-Sale:

SafeNet Multi-Link Encryptor CN8000

The following are key dates in the End-of-Sale process:

  • End-of-Sale Date:  12/31/2020
  • Start of Good Faith Support: 12/31/2021
  • End-of-Life/End-of-Support: 12/31/2023

The following is a list of HSE part numbers affected by this announcement, including, but not limited to, the part numbers listed in the table below:

End-of-Sale Part Number
Ethernet Encryptor, CN8000, 5X10GBPS With Chassis, 8002 Cards
Ethernet Encryptor, CN8000, 10X10GBPS With Chassis, 8002 Card
Ethernet Encryptor, CN8000, 5X10GBPS with Chassis, 8003 Cards
Ethernet Encryptor, CN8000, 10X10GBPS with Chassis, 8003 Cards
Alternative Products
Customers using these products are encouraged to migrate to the Thales CN6140 Multi-link Network Encryptor, the Thales CN9120 Network Encryptor (CN9120), or one of our other market leading high speed encryptors
Alternative Product Description Part Number
·        Ethernet Encryptor, 40 GBPS, DUAL AC, CN6140 943-000124-001-000
·        Ethernet Encryptor,100 GBPS, DUAL AC,CN9120 943-000305-001-000

Thales High Speed Encryptors are the first choice for network encryption.   They are field proven to secure data in transit including time-sensitive voice and video streams, as well as metadata for enterprise and government organizations, defense agencies, global financial transactions networks, and the world’s biggest cloud services providers. Thales data in motion encryptors help companies encrypt an even broader range of network traffic across more location types – from the data center to branch offices at speeds up to 100 Gbps.

For more information on features and migration procedures, please contact your local sales representative, or go to the Support Portal.

Viewing all 551 articles
Browse latest View live