Product Description

Product description

With the increasing need to protect disparate IT system, meet complex compliance regulations and contractual obligations, protecting data using mechanisms such as encryption is becoming more and more essential. As a consequence, many organizations see their Hardware Security Module (HSM) become more pervasive, playing an increasingly important role in safeguarding sensitive key materials used to protect important data encryption, management applications and online transactions.

This is where DPoD comes in to step up your cybersecurity game. 

Without the costly hassle of purchasing, deploying and maintaining your own hardware, Data Protection on Demand (DPoD) makes security simpler, more cost-effective and easier to manage. 

Deploying the protection you need, provisioning services, adding security policies and getting usage reporting can be done in minutes, with the click of a button. 

Easily integrate with your cloud, hybrid and IT services, secure your sensitive data in any environment (cloud, hybrid, or on-premises), meet compliance mandates, and centralize control of your encryption keys across all clouds. 

DPoD gives you data security on your own terms in only minutes, with no need for upfront capital investment, a convenient pay-as-you-go pricing model.

Contact Us to learn more details about Data Protection on Demand.

Unique Selling Points


  • 5 x application integrations
  • Automated key back-ups
  • Committed SLA of 99,95%
  • Crypto-agility. Always the latest crypto updates etc. available automatically
  • Disaster Recovery
  • High-Availability deployment
  • HSM On Demand Services
  • Optional managed services by cl8
  • Storage of 100 key pairs. Based on RSA 2048 key. Amount varies per key type, ask for more details
  • Support Via Thales channel partners or directly from Thales 24/7
  • Transactional capacity of 100 tpsmax. Amount of calls towards the service, ask more details

What our clients say

We have been very fortunate to have worked with some brilliant businesses over the years and are truly grateful for our amazing clients.
Here’s what they have to say about their experience of working with us.

Move To

Want to move to CL8?
Great choice. We will make sure that the process is fast, straightforward and free of any hiccups.
Let’s get you started.

Get Started

Get a quote

We’re happy to assist to make informed purchasing decisions that will, not only have an immediate impact but will also benefit your business in the long run.

Related Products


  • What is Encryption Key Management?

    Encryption is a process that uses algorithms to encode data as ciphertext. This ciphertext can only be made meaningful again if the person or application accessing the data has the data encryption keys necessary to decode the ciphertext. So, if the data is stolen or accidentally shared, it is protected because it is indecipherable, thanks to data encryption.

    Controlling and maintaining data encryption keys is an essential part of any data encryption strategy, because, with the encryption keys, a cybercriminal can return encrypted data to its original unencrypted state. An encryption key management system includes generation, exchange, storage, use, destruction and replacement of encryption keys.

  • As organizations deploy ever-increasing numbers of encryption solutions, they find themselves managing inconsistent policies, different levels of protection, and experience escalating costs. The best way through this maze is often to transition into a centralized key management model. In this key management case, and in contrast to the use of HSMs, the key management system performs only key management tasks, acting on behalf of other systems that perform cryptographic operations using those keys.

    The benefits of a centralized key management system include:

    • Unified key management and encryption policies
    • System-wide key revocation
    • A single point to protect
    • Cost reduction through automation
    • Consolidated audit information
    • A single point for recovery
    • Convenient separation of duty
    • Key mobility
  • Yes, you can.

    Many major SaaS, PaaS and IaaS vendors offer the ability to import keys from your on-premises HSM into a key vault or cloud HSM, fully described in Domain 11 of CSA Security Guidance for Critical Areas of Focus in Cloud Computing v4.0. The level of integration varies depending on cloud vendors and whether or not you opt for on-premises or cloud HSMs. You may need to manually perform the import, but you are provided up to FIPS 140-2 Level 3 security. From there the cloud provider derives keys from the master key you imported to encrypt data contained in various services (e.g., object, volume, database).

Need help?

We’re only a click away.