Star Rating
Languages Supported
Pricing Options

Encryption Key Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Encryption Key Management Software

    Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.

    Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.

    Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.

    To qualify for inclusion in the Encryption Key Management category, a product must:

    Provide compliance management capabilities for encryption keys
    Include key storage and backup functionality
    Enforce security policies related to key storage and distribution

    Top 8 Encryption Key Management Software

    • Egnyte
    • Azure Key Vault
    • AWS Key Management Service (KMS)
    • HashiCorp Vault
    • AWS CloudHSM
    • TokenEx
    • OpenSSH
    • GnuPG

    Compare Encryption Key Management Software

    G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
    Sort By:
    Results: 59
    View Grid®
    Adv. Filters
    (611)4.3 out of 5
    Optimized for quick response
    Entry Level Price:$10 per employee/month

    Egnyte is one unified SaaS platform to manage, secure, and gain insight into business content in all repositories, devices, and apps. More than 16,000 businesses trust Egnyte to protect business-critical data, make distributed teams more productive, and reduce file-sharing cost and complexity. AI-supported security, data governance and administration capabilities monitor files not just in Egnyte, but wherever they may live—whether that’s SharePoint, OneDrive, Azure, Google Cloud, Amazon S3, or

    (29)4.2 out of 5

    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.

    AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

    (30)4.3 out of 5

    HashiCorp Vault enables organizations to securely secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data across multiple clouds. Vault secrets management centrally manages and enforces access to secrets and systems based on a trusted a trusted source of application and user identity. Governance features enable security teams to control these identities for different teams. Additionally, Vault handles multi

    (12)4.3 out of 5

    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

    (17)4.6 out of 5

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type – including PCI, PII, PHI and even unstructured data formats – and integrate with nearly any processor or endpoint.

    (39)4.7 out of 5

    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.

    (11)4.2 out of 5

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    (18)4.4 out of 5

    Keyfactor is the industry leader in machine identity and cryptography management. We enable companies of all sizes to seamlessly orchestrate any key, any certificate, anywhere. Our flagship product, Keyfactor Command, enables our customers to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape. It's the only solution to combine fully-hosted PKI as-a-Service and certificate lifecycle automation into a single, cloud-delivered platform.

    (3)4.8 out of 5

    Akeyless Vault is an end-to-end unified platform to manage and protect all types of Secrets while fully securing Access. It provides coverage for all use cases, across hybrid, multi-cloud and legacy environments. Akeyless Vault enables full visibility into Secrets usage and detailed analytics, which are crucial for compliance with various security regulations and maintaining security controls. • Secrets Management - automate secrets across your DevOps tools and cloud platforms using a secured

    (2)4.3 out of 5

    Titan Security Keys are phishing-resistant two-factor authentication (2FA) devices that help protect high-value users such as IT admins. Titan Security Keys work with popular browsers and a growing ecosystem of services that support FIDO standards.

    Safenet ProtectDrive is identity and data protection solutions to protect the data, identities, and intellectual property.

    (2)4.5 out of 5

    Provides dynamic protection for machine identities across your extended infrastructure in one trust platform. Global visibility, deep intelligence and automation of all aspects of machine identities allow you to rapidly identify and automatically correct vulnerabilities and weaknesses in keys and certificates at machine speed and scale.

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

    (1)4.5 out of 5

    Cryptlex allows you to license and distribute your desktop apps, mobile apps, on-premise software, IoT apps and other digital goods effortlessly

    (1)4.0 out of 5

    EJBCA Enterprise's extendable PKI covers all demands for authentication efficiently and reliably.

    (1)4.0 out of 5

    (1)4.0 out of 5

    GitMonkey keeps your code clear of hazardous private keys.

    (1)5.0 out of 5

    Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 certified HSMs.

    Manage encryption keys on Google Cloud Platform

    (1)5.0 out of 5

    A new home for your SSH private key

    (1)5.0 out of 5

    Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to properly manage secrets of all kinds, including API and encryption keys. Lockr's key management solution-as-a-service protects against critical vulnerabilities, delivers best-practice security to help sites comply with many industry regulations, and provides a Defense in Depth approach to securing your

    (1)5.0 out of 5
    Entry Level Price:$0 5 Keys

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Benefits of Key Manager Plus 1. Gain complete visibility of all SSH keys and SSL certificates present in the organi

    (1)5.0 out of 5

    SecurityFirst provides innovative and affordable software solutions that protect one of the world's most valuable assets – digital data.

    0 ratings

    Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. At no extra charge, deploy Townsend Security’s ready-to-use security applications for Microsoft SQL Server Transparent Data Encryption (TDE) an

    0 ratings

    Global industry leader in copy protection & license management solutions, assisting clients like Caterpillar, Honeywell, Nokia & thousands more in 60+ countries

    0 ratings

    The CryptoMove Key Vault is a centralized place to administer secrets and passwords for you and your team backed by moving target defense - one of our first defenses to quantum computing. To learn more about moving target defense, please check out www.cryptomove.com.

    (2)0.0 out of 5

    Ekran System® is a universal insider threat protection platform helping business with employee monitoring, subcontractor control, PAM, and compliance tasks. The software platform delivers monitoring, recording and auditing of all user activity on critical endpoints, critical data and critical configurations. Per-session indexed video records is the core format. Detection capabilities are implemented in complex alerting system, that detects anomalies, flags risky actions, and provides all neede

    0 ratings

    Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.

    Select Grid® View
    Select Company Size
    G2 Grid® for Encryption Key Management
    Filter Grid®
    Filter Grid®
    Select Grid® View
    Select Company Size
    Check out the G2 Grid® for the top Encryption Key Management Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
    Leaders
    High Performers
    Contenders
    Niche
    GnuPG
    Egnyte
    OpenSSH
    AWS CloudHSM
    AWS Key Management Service (KMS)
    HashiCorp Vault
    Azure Key Vault
    TokenEx
    Market Presence
    Satisfaction