Banner Default Image

CJIS Compliance Solutions

Criminal Justice Information Services (CJIS) Security Policy

Green User Authentication IconA joint program of the FBI, State Identification Bureaus, and CJIS Systems Agency, the?Criminal Justice Information Services (CJIS) Security Policy?outlines the security precautions that must be taken to protect sensitive information like fingerprints and criminal backgrounds gathered by local, state, and federal criminal justice and law enforcement agencies.

The CJIS Security Policy contains specific requirements for wireless networking, remote access, encryption, certification of cryptographic modules, and minimum key lengths.

Criminal justice and law enforcement agencies should become familiar with the requirements set by the CJIS policy prior to procurement and deployment of affected systems.

Thales delivers remote access, multi-factor authentication, and encryption capabilities that ensure security of data throughout an organization, whether data is at rest, in transit, or in use.

Thales' Products for CJIS Compliance:

Multi-Factor Authentication

Multi-Factor Authentication

Multi-factor authentication serves a vital function within any organization – securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. Our authentication-as-a-service, authentication management, and wide variety of authentication form factors enable organizations to establish and easily administer reliable access control policies, all while following strong authentication best practices.

Learn More About Multi-Factor Authentication

Data-in-Motion Encryption

Data-in-Motion Encryption

Thales High Speed Encryptors deliver certified Layer 2 network encryption, ensuring the most secure data-in-motion protection, maximum performance, near-zero overhead with “set and forget” management, and lowest total cost of ownership. CJIS-SP requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency. Thales High Speed Encryptors can help provide control to protect the full life cycle of CJI in transit.

Learn More About Data-in-Transit Encryption for CJIS

Data at Rest Encryption Products

Data at Rest Encryption Products

In addition to Thales High Speed Encryptors, there are a broad range of Thales data encryption solutions that enable organizations to move past silo-constrained encryption and to centrally, uniformly deployed encryption in a scalable manner that spans the enterprise, and effectively control their CJI security policies. These solutions deliver unmatched coverage – securing databases, applications, personal identifiable information (PII), and storage in the physical and virtual data center and the cloud.

Learn More About Data Encryption


ISO Certified


Featured CJIS Compliance Resources

CJIS Data-in-Transit Encryption Standards - White Paper

How to become CJIS Compliant with SafeNet Trusted Access - Solution Brief

Police Department Addresses CJIS Compliance with Thales Strong Authentication - Case Study

Learn why the US Metropolitan Police Department (Metro PD) addressed CJIS Compliance with Thales Strong Authentication. With Thales, the department was able to deploy multi-factor authentication devices and management platforms that help verify user identities and guard...

大香伊在人线国产观看?大香伊在人线综合 大萫焦视频