Best Encryption Key Management Software

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.

Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.

Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.

To qualify for inclusion in the Encryption Key Management category, a product must:

  • Provide compliance management capabilities for encryption keys
  • Include key storage and backup functionality
  • Enforce security policies related to key storage and distribution
G2 Grid® for Encryption Key Management
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
Star Rating

Encryption Key Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Encryption Key Management Software

G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 28
Filter Results
Filter by:
Sort by
Star Rating
Sort By:
Results: 28

    AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.

    Egnyte
    (22)4.2 out of 5
    Optimized for quick response
    Optimized for quick response

    Egnyte is the only modern content platform that puts businesses first. Providing IT centralized control and protection of files, and users fast access to their content; regardless of file size, device or location.

    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.

    TokenEx
    (17)4.6 out of 5
    Optimized for quick response
    Optimized for quick response

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type – including PCI, PII, PHI and even unstructured data formats – and integrate with nearly any processor or endpoint.

    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

    HashiCorp Vault
    (13)4.0 out of 5
    Optimized for quick response
    Optimized for quick response

    HashiCorp Vault enables organizations to securely secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data across multiple clouds. Vault secrets management centrally manages and enforces access to secrets and systems based on a trusted a trusted source of application and user identity. Governance features enable security teams to control these identities for different teams. Additionally, Vault handles multi

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    GitMonkey keeps your code clear of hazardous private keys.

    Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to properly manage secrets of all kinds, including API and encryption keys. Lockr's key management solution-as-a-service protects against critical vulnerabilities, delivers best-practice security to help sites comply with many industry regulations, and provides a Defense in Depth approach to securing your

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Benefits of Key Manager Plus 1. Gain complete visibility of all SSH keys and SSL certificates present in the organi

    SecurityFirst provides innovative and affordable software solutions that protect one of the world's most valuable assets – digital data.

    Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

    Ekran System® is a universal insider threat protection platform helping business with employee monitoring, subcontractor control, PAM, and compliance tasks. The software platform delivers monitoring, recording and auditing of all user activity on critical endpoints, critical data and critical configurations. Per-session indexed video records is the core format. Detection capabilities are implemented in complex alerting system, that detects anomalies, flags risky actions, and provides all neede

    Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.

    Fortanix Self-Defending Key Management Service is the world's first cloud solution secured with Intel SGX. With SDKMS, you can securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data.

    Gemalto Enterprise Encryption applies security and access controls directly to your sensitive structured and unstructured data - wherever it resides.

    HyTrust KeyControl simplifies the process of key management for applications that do not require sophisticated policy based key management – but still need to perform to scale to enterprise grade level performance. And HyTrust KeyControl does this without costly physical appliances or license fees.

    Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.

    Latest Encryption Key Management Articles