Data Security Manager

Fortanix HSM Gateway

Centralized Key and HSM management across 3rd party HSM and Cloud HSM

What you get:

  • Unified management and application interface for on-prem and cloud HSM
  • Seamlessly create, manage, export and rotate keys across all HSM
  • Connects to any third party HSM that supports PKCS 11
  • Centralized audit logs for greater control and visibility
  • Use on-prem HSM keys to encrypt cloud data and achieve compliance
Fortanix HSM Gateway

Overview

Organizations have accumulated different types and brands of legacy HSMs to meet their Public Key Infrastructure (PKI), encryption and key management requirements. These systems must be managed separately, are hard for application developers to use, and are not equipped to migrate applications to the cloud. Continuing to maintain legacy HSMs is costly, slows down application development, and makes it difficult to migrate to public cloud. Fortanix HSM gateway, an extension of Fortanix Data Security Manager(DSM) manages keys in legacy HSMs and helps consolidate HSM infrastructure.
Overview Diagram

Benefits

icon

Consolidate HSM infrastructure

Fortanix HSM Gateway connects to the legacy on-prem and cloud HSM already available with organizations and make their keys manageable and accessible through Fortanix. This helps consolidate the HSM infrastructure, reduce cost, and complexity. 

icon

Migrate seamlessly to cloud

Fortanix HSM gateway enables businesses to seamlessly move between on-premises and public cloud infrastructures with a single consistent set of cryptographic services and keys.

icon

Simplify cryptographic operations

Fortanix simplifies operations and provides increased control with a “single pane of glass” modern, multi-tenant, and intuitive user interface. All cryptographic operations are logged and audited.

Adidas Logo
quote iconThere is sensitive data stored in our systems, whether its consumer data, sales data, or corporate secrets. This data has to be protected but we had a challenge. How exactly? How do you protect the keys? In a large organization, we want to avoid the situation where teams and stakeholders that decide how to protect data keys differently. So, we decided to provide a key management system and HSM as one of the security services to the rest of the organization.
quote iconWatch the webinar