Encryption Key Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.
Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.
Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.
To qualify for inclusion in the Encryption Key Management category, a product must:
Egnyte is one unified SaaS platform to manage, secure, and gain insight into business content in all repositories, devices, and apps. More than 16,000 businesses trust Egnyte to protect business-critical data, make distributed teams more productive, and reduce file-sharing cost and complexity. AI-supported security, data governance and administration capabilities monitor files not just in Egnyte, but wherever they may live—whether that’s SharePoint, OneDrive, Azure, Google Cloud, Amazon S3, or
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.
HashiCorp Vault enables organizations to securely secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data across multiple clouds. Vault secrets management centrally manages and enforces access to secrets and systems based on a trusted a trusted source of application and user identity. Governance features enable security teams to control these identities for different teams. Additionally, Vault handles multi
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type – including PCI, PII, PHI and even unstructured data formats – and integrate with nearly any processor or endpoint.
Keyfactor is the industry leader in machine identity and cryptography management. We enable companies of all sizes to seamlessly orchestrate any key, any certificate, anywhere. Our flagship product, Keyfactor Command, enables our customers to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape. It's the only solution to combine fully-hosted PKI as-a-Service and certificate lifecycle automation into a single, cloud-delivered platform.
Akeyless Vault is an end-to-end unified platform to manage and protect all types of Secrets while fully securing Access. It provides coverage for all use cases, across hybrid, multi-cloud and legacy environments. Akeyless Vault enables full visibility into Secrets usage and detailed analytics, which are crucial for compliance with various security regulations and maintaining security controls. • Secrets Management - automate secrets across your DevOps tools and cloud platforms using a secured
Titan Security Keys are phishing-resistant two-factor authentication (2FA) devices that help protect high-value users such as IT admins. Titan Security Keys work with popular browsers and a growing ecosystem of services that support FIDO standards.
Provides dynamic protection for machine identities across your extended infrastructure in one trust platform. Global visibility, deep intelligence and automation of all aspects of machine identities allow you to rapidly identify and automatically correct vulnerabilities and weaknesses in keys and certificates at machine speed and scale.
Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 certified HSMs.
Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to properly manage secrets of all kinds, including API and encryption keys. Lockr's key management solution-as-a-service protects against critical vulnerabilities, delivers best-practice security to help sites comply with many industry regulations, and provides a Defense in Depth approach to securing your
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Benefits of Key Manager Plus 1. Gain complete visibility of all SSH keys and SSL certificates present in the organi
Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. At no extra charge, deploy Townsend Security’s ready-to-use security applications for Microsoft SQL Server Transparent Data Encryption (TDE) an
The CryptoMove Key Vault is a centralized place to administer secrets and passwords for you and your team backed by moving target defense - one of our first defenses to quantum computing. To learn more about moving target defense, please check out www.cryptomove.com.
Ekran System® is a universal insider threat protection platform helping business with employee monitoring, subcontractor control, PAM, and compliance tasks. The software platform delivers monitoring, recording and auditing of all user activity on critical endpoints, critical data and critical configurations. Per-session indexed video records is the core format. Detection capabilities are implemented in complex alerting system, that detects anomalies, flags risky actions, and provides all neede
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.