Banner Default Image

CJIS Compliance Solutions

Criminal Justice Information Services (CJIS) Security Policy

Green User Authentication IconA joint program of the FBI, State Identification Bureaus, and CJIS Systems Agency, the Criminal Justice Information Services (CJIS) Security Policy outlines the security precautions that must be taken to protect sensitive information like fingerprints and criminal backgrounds gathered by local, state, and federal criminal justice and law enforcement agencies.

The CJIS Security Policy contains specific requirements for wireless networking, remote access, encryption, certification of cryptographic modules, and minimum key lengths.

Criminal justice and law enforcement agencies should become familiar with the requirements set by the CJIS policy prior to procurement and deployment of affected systems.

Thales delivers remote access, multi-factor authentication, and encryption capabilities that ensure security of data throughout an organization, whether data is at rest, in transit, or in use.

Thales' Products for CJIS Compliance:

Multi-Factor Authentication

Multi-Factor Authentication

Multi-factor authentication serves a vital function within any organization – securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. Our authentication-as-a-service, authentication management, and wide variety of authentication form factors enable organizations to establish and easily administer reliable access control policies, all while following strong authentication best practices.

Learn More About Multi-Factor Authentication

Data-in-Motion Encryption

Data-in-Motion Encryption

Thales High Speed Encryptors deliver certified Layer 2 network encryption, ensuring the most secure data-in-motion protection, maximum performance, near-zero overhead with “set and forget” management, and lowest total cost of ownership. CJIS-SP requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency. Thales High Speed Encryptors can help provide control to protect the full life cycle of CJI in transit.

Learn More About Data-in-Transit Encryption for CJIS

Data at Rest Encryption Products

Data at Rest Encryption Products

In addition to Thales High Speed Encryptors, there are a broad range of Thales data encryption solutions that enable organizations to move past silo-constrained encryption and to centrally, uniformly deployed encryption in a scalable manner that spans the enterprise, and effectively control their CJI security policies. These solutions deliver unmatched coverage – securing databases, applications, personal identifiable information (PII), and storage in the physical and virtual data center and the cloud.

Learn More About Data Encryption

SOC

ISO Certified

FIPS

Featured CJIS Compliance Resources

CJIS Data-in-Transit Encryption Standards - White Paper

How to become CJIS Compliant with SafeNet Trusted Access - Solution Brief

Cybercrime is recognized by the U.S. federal government as being a major threat to economic and national security. Indeed, numerous cyber attacks carried out in recent years have been aimed at government and state bodies. At the frontline of crime prevention, law enforcement...

Police Department Addresses CJIS Compliance with Thales Strong Authentication - Case Study

Police Department Addresses CJIS Compliance with Thales Strong Authentication - Case Study

When out on patrol, it’s imperative that police officers in a large city have access to data from the FBI’s Criminal Justice Information Services (CJIS) system, the primary central repository for criminal justice information in the United States. Now, Thales (formerly Gemalto)...