Thales Partners

Nutanix Thales Partners


Nutanix delivers invisible infrastructure for next-generation enterprise computing, elevating IT to focus on the applications and services that power their business. By natively converging server and storage resources into the turnkey Xtreme Computing Platform that is easy to deploy and manage, Nutanix has helped large and small IT organizations simplify their data center and gain predictable performance, linear scalability, and cloud-like infrastructure consumption.


Nutanix Enterprise Cloud OS Software and Thales CipherTrust Manager

The Nutanix Enterprise Cloud OS software provides strong data protection by enabling the encryption of user and application data in compliance with FIPS 140-2 Standards. Data at rest can be encrypted through the use of self-encrypting drives (SED) or via native software-based encryption. When used with CipherTrust Manager, the combined solution provides FIPS certified robust key management and role separation designed to meet the most stringent security requirements.

Resources and Additional Information


Nutanix and Thales Deliver Effective Centralized Key Management Solution - Solution Brief


Nutanix Acropolis HCI platform

Nutanix Acropolis software converges compute and storage to provide the cloud-like infrastructure that can run any application at any scale. Unlike other HCI products, Acropolis provides the freedom to choose the right technology for the business, including hardware platforms, virtualization technology and public cloud integration. With in-built data protection, security, and self-healing capabilities, IT teams get a full-stack solution they control, which can be deployed in minutes - without requiring teams of specialists.

The Nutanix Enterprise Cloud enables data security by encrypting user and application data to enable FIPS compliance. Thales KeySecure integrates with Nutanix via the Key Management Interoperability Protocol (KMIP) to store encryption keys safely away from the data, and provides robust, enterprise-scale key management, ensuring that encryption keys are managed throughout their lifecycle and properly secured with FIPS 140-2 certified hardware or hardened virtual appliance. Centralizing key management makes it easier for administrators to account for encryption keys and generate detailed records for auditors and regulators. The joint solution is a secure and efficient means, then, of protecting data, and helping meet data security compliance mandates such as FIPS 140-2, PCI DSS, HIPAA, and GDPR.