Gemalto is now part of the Thales Group, find out more.
Contact Us

CJIS Compliance Solutions

Criminal Justice Information Services (CJIS) Security Policy

Green User Authentication Icon

A joint program of the FBI, State Identification Bureaus, and CJIS Systems Agency, the Criminal Justice Information Services (CJIS) Security Policy outlines the security precautions that must be taken to protect sensitive information like fingerprints and criminal backgrounds gathered by local, state, and federal criminal justice and law enforcement agencies.

The CJIS Security Policy contains specific requirements for wireless networking, remote access, encryption, certification of cryptographic modules, and minimum key lengths.

Criminal justice and law enforcement agencies should become familiar with the requirements set by the CJIS policy prior to procurement and deployment of affected systems.

Gemalto delivers remote access, multi-factor authentication, and encryption capabilities that ensure security of data throughout an organization, whether data is at rest, in transit, or in use.

Gemalto's SafeNet Products for CJIS Compliance:

Secure Access with Multi-Factor Authentication

Multi-Factor Authentication

Multi-factor authentication serves a vital function within any organization – securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. Our authentication-as-a-service, authentication management, and wide variety of authentication form factors enable organizations to establish and easily administer reliable access control policies, all while following strong authentication best practices.

Learn More About Multi-Factor Authentication
Network Encryption for CJIS Compliance

Data-in-Motion Encryption

SafeNet High Speed Encryptors deliver certified Layer 2 network encryption, ensuring the most secure data-in-motion protection, maximum performance, near-zero overhead with “set and forget” management, and lowest total cost of ownership. CJIS-SP requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency. SafeNet High Speed Encryptors can help provide control to protect the full life cycle of CJI in transit.

Learn More About Data-in-Transit Encryption for CJIS
Data Encryption Icon

Data at Rest Encryption Products

In addition to SafeNet High Speed Encryptors, there are a broad range of SafeNet data encryption solutions that enable organizations to move past silo-constrained encryption and to centrally, uniformly deployed encryption in a scalable manner that spans the enterprise, and effectively control their CJI security policies. These solutions deliver unmatched coverage – securing databases, applications, personal identifiable information (PII), and storage in the physical and virtual data center and the cloud.

Learn More About Data Encryption

Featured CJIS Compliance Resources

Choosing an Authentication Solution for CJIS Compliance - White Paper

This paper explains how to select an authentication solution that can address the Criminal Justice Information Services (CJIS) Security Policy requirements.

Get this resource

How to become CJIS Compliant with SafeNet Authentication - Solution Brief

Learn how to become CJIS Compliant with SafeNet Authentication with our guidelines that provide insight into how to select the advanced authentication method that is most appropriate to y...

Get this resource

CJIS Data-in-Transit Encryption Standards - White Paper

This paper offers a number of insights into the approaches that can help organizations address data-in-transit encryption policies most efficiently and effectively.

Get this resource

Police Department Addresses CJIS Compliance with Gemalto Strong Authentication

Learn why the US Metropolitan Police Department (Metro PD) addressed CJIS Compliance with Gemalto Strong Authentication. With Gemalto, the department was able to deploy multi-factor authe...

Get this resource

A Security Survey of Strong Authentication Technologies - White Paper

Are you misunderstanding the true cost of strong authentication? Many organizations rarely look closely at the total cost of operation of their authentication solution and instead make a ...

Get this resource

Are You CJIS-Ready? Infographic

As part of the new CJIS Security Policy (CJIS-SP) to protect sensitive information—the leakage of which can reduce the effectiveness of ongoing crime-fighting operations—as of September 1...

Get this resource
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.