Gemalto is now part of the Thales Group, find out more.
Contact Us

Verizon: Certificate Services with SafeNet

About Verizon

Verizon technology solutions are powered by investments in networking, cloud, mobility, machine-to-machine, and security.  Those solutions meet the demands and challenges shaping business today, helping users drive results, reach more customers, and increase revenue. Verizon UniCERT 5.x effectively integrates with SafeNet Luna SA Hardware Security Module (HSM) to secure certificate services solutions.


Verizon operates the networks, information systems, and mobile technologies that help businesses and governments securely expand reach, increase agility, and maintain longevity. Verizon effectively integrates with SafeNet Luna SA HSM to secure certificate services solutions.

Verizon: Certificate Services with SafeNet

Verizon Wireless ATTN: Correspondence Team PO Box 5029
Wallingford, Connecticut 06492
United States
North America
Main Phone: 1-877-297-7816

Integrated Application(s):

    Verizon UniCERT 5.x: Certificate Services with SafeNet Luna SA

    Verizon UniCERT is a flexible and highly-scalable application suite that provides the functionality required to implement and maintain a Public Key Infrastructure (PKI) system (certification authority, PKI management, certificate registration and lifecycle management functions). The application suite issues and manages the digital certificates that allow IT systems to verify user identities. UniCERT offers manual and automatic receipt and processing of key generation requests, certificate generation, key archival and certificate suspension/revocation.

    UniCERT integrates with SafeNet Luna SA HSM for secure encryption key and certificate storage and protection. SafeNet Luna SA HSMs are robust, high-performance, and high-availability appliances that store cryptographic materials (e.g. certificates, SSL private keys, etc.) in secure FIPS 140-2 Level 3 tamper-proof hardware. Storing these materials in a hardware appliance means the keys never leave the device, and cryptographic operations take place in the module to ensure the integrity of the entire cryptographic infrastructure.

Back to Partner Search
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.