SafeNet on Tuesday announced (limited) availability of the SafeNet Crypto Hypervisor, a new solution designed to help IT departments and service providers deliver on-demand, elastic key vaulting and encryption services to protect data across physical, virtual, and cloud environments.
In minutes instead of days, SafeNet says its Crypto Hypervisor enables organizations to virtualize their crypto resources in an efficient and scalable way, and ensures data can be encrypted, even as it moves in a virtualized environment.
“The solution’s high assurance encryption services fit the cloud operations model and the full cost and innovation advantages of virtualization can be exploited without compromising security or compliance,” SafeNet explained.
IT maintains full control of the delivery of encryption services such as secure key storage, while users have full control of their encryption service, and can be assured that other tenants and administrators cannot access their encryption keys, the company said.
Featured Resource: Aberdeen Research – Encryption, Without Tears
“Although encryption is becoming more common, data is only as safe as the keys protecting it,” said Christian A. Christiansen, Program Vice President of Security Products & Services with IDC. “Storing the keys in special-purpose hardware, such as a hardware security module, is the recommended best practice. However, until now, hardware encryption solutions have not provided sufficient agility and flexibility needed in virtualized and cloud environments.”
The Crypto Hypervisor runs on the SafeNet Luna SA 5 HSM hardware appliance and can be managed and configured by administrators using the new SafeNet Crypto Command Center.
Through a web portal, users can view a catalog of services that they have permission to create, and can provision services on demand on shared physical hardware. As a result, organizations can use as little as five percent of the hardware they use today for the same amount of encryption services.
“The move to virtualization and cloud has revolutionized the way we store and protect data. This necessitates a similar revolution in the way in which crypto resources are shared and managed,” said Tsion Gonen, Chief Strategy Officer at SafeNet.
Delivering encryption services in the cloud can be a challenging and slow process for IT departments, something SafeNet is hoping to change with its solution.
“Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project,” Christiansen said.
“[With Crypto Hypervisor], starting an encryption service is equivalent to a simple process like spinning up a new VM,” Gonen said.
The Crypto Command Center bundle is orderable now for future delivery, SafeNet said. The Luna 5.2 HSM software and Crypto Command Center are both available immediately on a limited basis for some customers.
Featured Resource: Aberdeen Research – Encryption, Without Tears
Featured Resource: Is Your Enterprise Managing Certificates? Three Reasons It Should Be.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- ‘No Evidence’ of Cyberattack Related to FAA Outage, White House Says
- SecurityWeek to Host 2022 ICS Cybersecurity Conference October 24-27 in Atlanta
- Google Completes $5.4 Billion Acquisition of Mandiant
- Cybersecurity Firm ZeroFox Begins Trading on Nasdaq via SPAC Deal
- HUMAN Security and PerimeterX Merge on Mission to Combat Bots
- Last Call: CFP for ICS Cybersecurity Conference Closes July 15th
- Johnson Controls Acquires Tempered Networks to Shield Buildings From Cyberattacks
- Snowflake Launches Cybersecurity Workload to Find Threats Across Massive Data Sets
Latest News
- Skybox Security Raises $50M, Hires New CEO
- Spies, Hackers, Informants: How China Snoops on the US
- Australian Man Sentenced for Scam Related to Optus Hack
- Chrome 110 Patches 15 Vulnerabilities
- Application Security Protection for the Masses
- Tor Network Under DDoS Pressure for 7 Months
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- UN Experts: North Korean Hackers Stole Record Virtual Assets
