Best Encryption Key Management Software

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.

Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.

Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.

To qualify for inclusion in the Encryption Key Management category, a product must:

  • Provide compliance management capabilities for encryption keys
  • Include key storage and backup functionality
  • Enforce security policies related to key storage and distribution
G2 Grid® for Encryption Key Management
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
content
Star Rating

Encryption Key Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Encryption Key Management Software

Results: 28
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 28
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.

    AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.

    Egnyte
    (18)4.2 out of 5
    Optimized for quick response
    Optimized for quick response

    Egnyte is the only modern content platform that puts businesses first. Providing IT centralized control and protection of files, and users fast access to their content; regardless of file size, device or location.

    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

    TokenEx
    (13)4.8 out of 5
    Optimized for quick response
    Optimized for quick response

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type – including PCI, PII, PHI and even unstructured data formats – and integrate with nearly any processor or endpoint.

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    HashiCorp Vault enables organizations to securely secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data across multiple clouds. Vault secrets management centrally manages and enforces access to secrets and systems based on a trusted a trusted source of application and user identity. Governance features enable security teams to control these identities for different teams. Additionally, Vault handles multi-datacenter replication and disaster recovery so you can maintain continuous and agile application delivery.

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    GitMonkey keeps your code clear of hazardous private keys.

    Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to properly manage secrets of all kinds, including API and encryption keys. Lockr's key management solution-as-a-service protects against critical vulnerabilities, delivers best-practice security to help sites comply with many industry regulations, and provides a Defense in Depth approach to securing your data. Lockr is affordable, enterprise-grade key management.

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Benefits of Key Manager Plus 1. Gain complete visibility of all SSH keys and SSL certificates present in the organization and achieve centralized control. 2. Remove all existing public key-user trust relationships and generate new key pairs. Deploy the new public keys to users in bulk with just a couple of clicks. 3. Tighten security by periodically rotating keys and prevent their misuse. 4. Launch direct connections to remote devices by using the keys present in Key Manager Plus, saving time and enhancing productivity. 5. Delete any unwanted keys from the database, terminate access immediately, and prevent violations by obsolete accounts. 6. Get customizable, recurring notifications when the validity of an SSL certificate is about to expire. 7. Eliminate service downtime or display of error messages due to expired/invalid/rogue SSL certificates.

    SecurityFirst provides innovative and affordable software solutions that protect one of the world's most valuable assets – digital data.

    Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

    Ekran System® is a universal insider threat protection platform helping business with employee monitoring, subcontractor control, PAM, and compliance tasks. The software platform delivers monitoring, recording and auditing of all user activity on critical endpoints, critical data and critical configurations. Per-session indexed video records is the core format. Detection capabilities are implemented in complex alerting system, that detects anomalies, flags risky actions, and provides all needed context for adequate response. To prevent insider threats, the platform includes toolsets for both manual and automated incident response, such as user warning, user blocking, activity termination, USB device alerting and blocking. Ekran System® provides easy to use access management solutions such as two-factor authentication, one-time passwords, privileged account and session management (PASM), ticketing system integrations, and others. They were designed to bring privileged activity control to the next level and meet compliance requirements. The platform has a flexible licensing system, thus giving you an integrated solution to build your security strategy within your budget.

    Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.

    Fortanix Self-Defending Key Management Service is the world's first cloud solution secured with Intel SGX. With SDKMS, you can securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data.

    Gemalto Enterprise Encryption applies security and access controls directly to your sensitive structured and unstructured data - wherever it resides.

    HyTrust KeyControl simplifies the process of key management for applications that do not require sophisticated policy based key management – but still need to perform to scale to enterprise grade level performance. And HyTrust KeyControl does this without costly physical appliances or license fees.

    Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.

    Additive Process for Assuring the Identity of Sending & Receiving Parties During Key Exchange

    Revolutionary Threshold Key Management Solutions For Blockchain, Cryptocurrency, and Cloud Service providers

    Thales eSecurity on-premises key management solutions unify and centralize encryption key management and provide secure key storage for data storage solutions.