Luna SA

Luna SA 5.0 is the choice for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certifi cate signing, code or document signing, bulk key generation, data encryption, and more.

A Unique Design Philosophy

By its very name, HSM implies hardware. As such, most security professionals assume that all HSMs actually store cryptographic keys in hardware, as Luna SA does by default. In fact, while other leading HSMs generate their keys in hardware, they actually store the cryptographically wrapped keys on an application server. These keys, residing in software, can be easily detected—creating an additional attack surface.

The advantages of hardware are key reasons why the world’s largest enterprises and government organizations trust SafeNet HSMs to guard more digital identities and interbank fund transfers than any other HSM in the world.

With Luna SA 5.0, SafeNet is going deeper into hardware than ever before, incorporating an HSM within an HSM, by utilizing a special, SafeNet-designed, tamper-proof ASIC cryptographic processor. This chip leverages the same technology that is protecting the most sensitive data in space, data centers, and defense facilities. In addition, with Luna SA 5.0, more keys may be stored in hardware than ever before.

Download Luna SA Datasheet

Find out more about the SafeNet product range:


Luna SA Luna PCI-E Luna EFT ProtectServer External & Gold (PCI-E)


 
  • Free Resources for HSMs & Key Management

    We've put together all the best HSM (hardware security module) and key management resources you'll need to take a crash course in understanding hardware encryption.

    Download Free Info Pack

  • Learn more about Digital Signing

    Looking at reducing costs and improving the trust of your organisation's documents?
    Try Digital Document signing today...

    Find Out More

  • HSM Product Video

    This webinar will teach you how to protect sensitive data, IT networks and business apps like PKI, ID management, database encryption and more...

    Watch Video

  • ICT Security Consultation

    Is your encryption solution secure?
    What about your PKI?
    Do you meet PCI DSS compliance?

    ICT Security holds your answers...

    Contact Us