fitgap

Thales Data Protection on Demand

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if Thales Data Protection on Demand and its alternatives fit your requirements.
Pricing from
Pay-as-you-go
Free Trial
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Healthcare and life sciences
  2. Energy and utilities
  3. Information technology and software

What is Thales Data Protection on Demand

Thales Data Protection on Demand is a cloud-delivered key management and cryptographic services offering used to protect sensitive data across applications, databases, and cloud workloads. It provides centralized key generation, storage, rotation, and access controls, typically backed by hardware security modules (HSMs) operated by the vendor. Security and platform teams use it to enforce encryption policies, support compliance requirements, and reduce the operational burden of running on-premises key management infrastructure. It is commonly deployed for multi-cloud and hybrid environments where consistent key control and auditability are required.

pros

Cloud-managed HSM-backed keys

The service provides managed cryptographic infrastructure so teams can use HSM-backed key protection without operating HSM hardware themselves. This can reduce time spent on provisioning, patching, and lifecycle management compared with self-hosted key management stacks. It fits organizations that want centralized key control while keeping cryptographic operations in a dedicated security service. It also supports use cases where separation of duties between application owners and key administrators is required.

Centralized policy and access control

It centralizes key access policies and administrative controls, helping standardize how encryption keys are created, used, and rotated across environments. This supports governance patterns where multiple applications and teams need controlled access to keys. Centralization can simplify audits by consolidating key-related events and administrative actions. It is particularly relevant in regulated environments that require demonstrable controls around key custody and usage.

Integrates with enterprise data protection

The product aligns with broader enterprise encryption and tokenization architectures by providing a shared key service for multiple data protection components. This can reduce duplicated key stores across different tools and workloads. It is useful when organizations need consistent cryptographic controls across on-premises and cloud deployments. Integration options typically include standard key management interfaces and vendor tooling for common enterprise platforms.

cons

Vendor dependency for key services

Because it is delivered as a managed service, availability, maintenance windows, and certain operational controls depend on the vendor. Some organizations may require customer-managed infrastructure for strict sovereignty or internal control policies. Moving away from a managed key service can require reworking integrations and operational processes. This dependency can be a concern for workloads with stringent resilience or isolation requirements.

Complexity in hybrid integrations

Integrating centralized key management across diverse applications, clouds, and legacy systems can require careful design and ongoing administration. Some workloads may need application changes or specific connectors to use external key services effectively. Hybrid deployments can introduce latency, network dependency, and troubleshooting complexity compared with local key stores. Teams often need strong IAM and network governance to avoid misconfigurations.

Cost and licensing considerations

Managed cryptographic services can be more expensive than basic software-only key stores, especially at high transaction volumes or with multiple environments. Costs may include service tiers, HSM capacity, API usage, and support. Budgeting can be harder when usage-based pricing applies to cryptographic operations. Organizations should validate total cost against compliance needs and operational savings.

Plan & Pricing

Pricing model: Pay-as-you-go (usage-based) Where prices are published: Public list pricing for Data Protection on Demand (DPoD) services (for example Luna Cloud HSM, CipherTrust Data Security Platform, payShield Cloud HSM) is published on the DPoD Marketplace (market.dpondemand.io). The Thales DPoD pricing page states that online list pricing is currently displayed in Euros only and that billing/quoting can be completed in other currencies by contacting Thales. Thales also offers billing options (Full Upfront, Annual Upfront, Monthly Arrears). For services that offer more than one plan, the marketplace listing shows the basic plan price; partner services may require contacting partners.

Example costs / notes: No specific SKU or per-unit prices are shown on the Thales DPoD pricing page itself; customers are directed to the DPoD Marketplace to view public list prices or to contact Thales for a customized quote for their location and currency. The marketplace requires a DPoD account to view and subscribe to services.

Free tier/trial: 30-day free evaluation (30-day free trial) is offered (as stated on the official DPoD pages).

Seller details

Thales Group
Meudon, France
1893
Public
https://www.thalesgroup.com/
https://x.com/thalesgroup
https://www.linkedin.com/company/thales/

Tools by Thales Group

Imperva Advanced Bot Protection
Imperva App Protect
Imperva Secure CDN
Imperva API Security
Vormetric Data Security Platform
Imperva Cloud Data Protection
Imperva Cloud Data Security
Imperva Application Security Platform
Imperva Runtime Application Self-Protection (RASP)
Vormetric Transparent Encryption
Thales CipherTrust Transparent Encryption
Thales Data Protection on Demand
Thales Hardware Security Modules (HSMs)
Thales CipherTrust Cloud Key Manager
Thales CipherTrust Manager
Imperva Web Application Firewall (WAF)
Thales SafeNet Trusted Access
SafeNet Authentication Service Private Cloud Edition (SAS PCE)
Thales OneWelcome Identity Platform
Thales FIDO and FIDO2 Security Keys

Popular categories

All categories