Data Protection on Demand Marketplace

The award-winning Thales Data Protection on Demand (DPoD) is a cloud‑based platform providing a wide range of cloud HSM and key management services through a simple online marketplace. Deploy and manage key management and hardware security module services, on‑demand and from the cloud.


Get data security on your terms – in minutes

Security is now simpler, more cost effective and easier to manage because there is no hardware to buy, deploy and maintain. Just click and deploy the services you need in the Data Protection on Demand marketplace, provision users, add devices and get usage reporting in minutes.

Get data security on your terms – in minutes

Access to a Wide Range of Security Services. Simply Click and Deploy What you Need for Protection. Security as a Service (SECaaS) Offerings Within Minutes.

Zero upfront capital investment and pay-as-you go pricing

No Hardware or Software to Buy, Support, or Update. No Capital Expenditures. Flexibility to Purchase Services to Suit Changing Business Needs.

Easily integrate with your cloud and IT services

Preconfigured APIs Make it Easier to Integrate: Key Management, HSM on Demand Services.

Protect data anywhere and meet compliance mandates

Secure Sensitive Data in Any Environment – Cloud, Virtual or On-Premise. Protect the Data you Create, Store and Analyze. Crypto Enable Your Blockchain, Cloud, and Internet of Things (IoT) Applications.

Infinite scalability and elasticity

Scale HSM and Key Management Services Up and Down Automatically. Easily Grow HSM and Key Management Capacity and Crypto Resources Without Limitations.

Focus on your business, not managing hardware and software

No Need to Buy, Provision, Configure, and Maintain Hardware and Software. All Physical Hardware, Software, and Infrastructure is Managed by Thales, Including an SLA.

The key thing for us is GDPR compliance and peace of mind for our customers. Thales’s CipherTrust Cloud Key Management (CCKM) service on the DPoD marketplace allows us to hold and control encryption keys on behalf of our customers outside of the cloud platform where the data resides, including revoking the keys to remove access from cloud administrators as needed. Government customers tend to be on the safe side, we were hearing from prospects that this is something they would like to see.
Tim Warberg Senior Software Architect and Platform Engineer Monsido powered by CivicPlus Read the Case Study

How the DPoD Marketplace Works

Data Protection on Demand is cloud agnostic, so regardless of whether you use Microsoft Azure, Google, IBM, or Amazon Web Services or a combination of cloud and on-premises solutions, you are always in control of your encryption keys.

There is no hardware or software to buy, support and update, so you don’t have any capital expenditures. In addition, with unique pay-as-you-grow pricing, you have the flexibility to purchase services to suit your changing business needs.

Deploy the services you need where you need them

Luna HSM

Luna Cloud HSM

Cloud-based HSM services enable customers to protect critical cryptographic keys and to accelerate sensitive cryptographic operations for a wide range of security applications, across clouds, hybrid and on-premises environments.


CipherTrust Key Management Services

CipherTrust Data Security Platform (CDSPaaS) enables customers to launch new key management and data protection services quickly, easily, and without upfront investment.

payShield Cloud HSM

payShield Cloud HSM

payShield Cloud HSM provides secure real-time, cryptographic processing capabilities and addresses the needs of existing users of payment HSMs and new payment entrants.

The simple, ease of deployment and use that Data Protection On Demand provides aligns perfectly with Treezor’s vision to provide services simply, securely and cost-effectively across the entire payment chain, from traditional banks to the most innovative fintech companies.
Eric Lassus General Director Treezor

Thales Data Protection on Demand Services

With a growing menu of cloud-based security applications at your fingertips, including hundreds that work with the industry-standard PKCS11 interface, select the security service you require from an expanding range of options and integrations.

Get Started with Data Protection on Demand