Introducing G2.ai, the future of software buying.Try now

Best Encryption Key Management Software

Lauren Worth
LW
Researched and written by Lauren Worth

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.

Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.

Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.

To qualify for inclusion in the Encryption Key Management category, a product must:

Provide compliance management capabilities for encryption keys
Include key storage and backup functionality
Enforce security policies related to key storage and distribution
Show More
Show Less

Best Encryption Key Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Encryption Key Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
70 Listings in Encryption Key Management Available
(17)4.6 out of 5
View top Consulting Services for Google Cloud Key Management Service
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Manage encryption keys on Google Cloud Platform

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Key Management Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Storage
    1
    Easy Access
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Key Management Service features and usability ratings that predict user satisfaction
    7.7
    Regional Support
    Average: 8.6
    8.6
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,508,752 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Manage encryption keys on Google Cloud Platform

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 29% Small-Business
Google Cloud Key Management Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Storage
1
Easy Access
1
Cons
Slow Performance
1
Google Cloud Key Management Service features and usability ratings that predict user satisfaction
7.7
Regional Support
Average: 8.6
8.6
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
9.2
Ease of Use
Average: 8.7
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,508,752 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(1,107)4.4 out of 5
Optimized for quick response
2nd Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

    Users
    • Project Manager
    • President
    Industries
    • Construction
    • Marketing and Advertising
    Market Segment
    • 44% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Egnyte Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    92
    File Sharing
    54
    Security
    42
    Easy Sharing
    41
    Easy Access
    36
    Cons
    Expensive
    19
    File Management
    13
    Slow Processing
    10
    User Accessibility
    10
    User Difficulty
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Egnyte features and usability ratings that predict user satisfaction
    9.0
    Regional Support
    Average: 8.6
    9.0
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Egnyte
    Company Website
    Year Founded
    2008
    HQ Location
    Mountain View, CA
    Twitter
    @Egnyte
    16,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,188 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

Users
  • Project Manager
  • President
Industries
  • Construction
  • Marketing and Advertising
Market Segment
  • 44% Small-Business
  • 39% Mid-Market
Egnyte Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
92
File Sharing
54
Security
42
Easy Sharing
41
Easy Access
36
Cons
Expensive
19
File Management
13
Slow Processing
10
User Accessibility
10
User Difficulty
10
Egnyte features and usability ratings that predict user satisfaction
9.0
Regional Support
Average: 8.6
9.0
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.7
Seller Details
Seller
Egnyte
Company Website
Year Founded
2008
HQ Location
Mountain View, CA
Twitter
@Egnyte
16,254 Twitter followers
LinkedIn® Page
www.linkedin.com
1,188 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(55)4.5 out of 5
8th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Sec

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Accounting
    Market Segment
    • 51% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Key Vault features and usability ratings that predict user satisfaction
    8.9
    Regional Support
    Average: 8.6
    8.9
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,090,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Sec

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Accounting
Market Segment
  • 51% Enterprise
  • 25% Small-Business
Azure Key Vault features and usability ratings that predict user satisfaction
8.9
Regional Support
Average: 8.6
8.9
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.5
Ease of Use
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,090,087 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
(82)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Akeyless Identity Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Ease of Use
    9
    Security
    7
    Easy Integrations
    3
    Implementation Ease
    3
    Cons
    Authentication Issues
    2
    Learning Curve
    2
    Missing Features
    2
    Poor Customer Support
    2
    Poor UI
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akeyless Identity Security Platform features and usability ratings that predict user satisfaction
    9.4
    Regional Support
    Average: 8.6
    9.4
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akeyless
    Company Website
    Year Founded
    2018
    HQ Location
    Ramat Gan, Israel
    Twitter
    @akeylessio
    280 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    102 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 28% Mid-Market
Akeyless Identity Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Ease of Use
9
Security
7
Easy Integrations
3
Implementation Ease
3
Cons
Authentication Issues
2
Learning Curve
2
Missing Features
2
Poor Customer Support
2
Poor UI
2
Akeyless Identity Security Platform features and usability ratings that predict user satisfaction
9.4
Regional Support
Average: 8.6
9.4
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.7
Seller Details
Seller
Akeyless
Company Website
Year Founded
2018
HQ Location
Ramat Gan, Israel
Twitter
@akeylessio
280 Twitter followers
LinkedIn® Page
www.linkedin.com
102 employees on LinkedIn®
(61)4.8 out of 5
1st Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 80% Small-Business
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppler secrets management platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Easy Integrations
    6
    Integrations
    5
    Tools
    3
    Security
    2
    Cons
    Expensive
    4
    Complex Setup
    3
    Limited Automation
    1
    Limited OS Compatibility
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    7.6
    Regional Support
    Average: 8.6
    9.6
    Scalability
    Average: 8.7
    9.4
    API/Integrations
    Average: 8.5
    9.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,465 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 80% Small-Business
  • 18% Mid-Market
Doppler secrets management platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Easy Integrations
6
Integrations
5
Tools
3
Security
2
Cons
Expensive
4
Complex Setup
3
Limited Automation
1
Limited OS Compatibility
1
Setup Difficulty
1
Doppler secrets management platform features and usability ratings that predict user satisfaction
7.6
Regional Support
Average: 8.6
9.6
Scalability
Average: 8.7
9.4
API/Integrations
Average: 8.5
9.6
Ease of Use
Average: 8.7
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,465 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 56% Enterprise
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Key Management Service (KMS) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Azure Services
    1
    Cloud Services
    1
    Security Protection
    1
    Cons
    Access Issues
    1
    Connectivity Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Key Management Service (KMS) features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    9.2
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,217,637 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 56% Enterprise
  • 22% Mid-Market
AWS Key Management Service (KMS) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Azure Services
1
Cloud Services
1
Security Protection
1
Cons
Access Issues
1
Connectivity Issues
1
AWS Key Management Service (KMS) features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
9.2
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.7
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,217,637 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(36)4.3 out of 5
View top Consulting Services for Oracle Cloud Infrastructure Vault
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Cloud Infrastructure Vault features and usability ratings that predict user satisfaction
    8.2
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.3
    API/Integrations
    Average: 8.5
    8.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    820,945 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197,850 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 31% Enterprise
Oracle Cloud Infrastructure Vault features and usability ratings that predict user satisfaction
8.2
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.3
API/Integrations
Average: 8.5
8.4
Ease of Use
Average: 8.7
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
820,945 Twitter followers
LinkedIn® Page
www.linkedin.com
197,850 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS CloudHSM features and usability ratings that predict user satisfaction
    6.7
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.2
    API/Integrations
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,217,637 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 36% Small-Business
AWS CloudHSM features and usability ratings that predict user satisfaction
6.7
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.2
API/Integrations
Average: 8.5
8.5
Ease of Use
Average: 8.7
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,217,637 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(388)4.4 out of 5
Optimized for quick response
4th Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Starting at $119.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

    Users
    • Administrative Assistant
    • IT Manager
    Industries
    • Hospital & Health Care
    • Health, Wellness and Fitness
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Virtru Email Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    60
    Security
    59
    Encryption
    43
    Email Encryption
    35
    Secure Communication
    31
    Cons
    Email Issues
    44
    Email Encryption Issues
    38
    Encryption Issues
    24
    Access Issues
    17
    Access Limitations
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtru Email Encryption features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Virtru
    Company Website
    Year Founded
    2012
    HQ Location
    Washington, DC
    Twitter
    @virtruprivacy
    1,797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

Users
  • Administrative Assistant
  • IT Manager
Industries
  • Hospital & Health Care
  • Health, Wellness and Fitness
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
Virtru Email Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
60
Security
59
Encryption
43
Email Encryption
35
Secure Communication
31
Cons
Email Issues
44
Email Encryption Issues
38
Encryption Issues
24
Access Issues
17
Access Limitations
12
Virtru Email Encryption features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.1
Ease of Use
Average: 8.7
Seller Details
Seller
Virtru
Company Website
Year Founded
2012
HQ Location
Washington, DC
Twitter
@virtruprivacy
1,797 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
(77)4.5 out of 5
10th Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 82% Enterprise
    • 13% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command features and usability ratings that predict user satisfaction
    8.1
    Regional Support
    Average: 8.6
    8.7
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Company Website
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,778 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    468 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 82% Enterprise
  • 13% Mid-Market
Keyfactor Command features and usability ratings that predict user satisfaction
8.1
Regional Support
Average: 8.6
8.7
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.2
Ease of Use
Average: 8.7
Seller Details
Seller
Keyfactor
Company Website
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,778 Twitter followers
LinkedIn® Page
www.linkedin.com
468 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure confidential computing offers solutions to enable the isolation your sensitive data while it's being processed in the cloud. Learn how to create and deploy applications based on confidential com

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Confidential Computing features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,090,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure confidential computing offers solutions to enable the isolation your sensitive data while it's being processed in the cloud. Learn how to create and deploy applications based on confidential com

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 33% Small-Business
Azure Confidential Computing features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,090,087 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Box KeySafe features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Box
    Year Founded
    1998
    HQ Location
    Redwood City, CA
    Twitter
    @Box
    76,860 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,039 employees on LinkedIn®
    Ownership
    NYSE:BOX
Product Description
How are these determined?Information
This description is provided by the seller.

With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Enterprise
Box KeySafe features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.3
Ease of Use
Average: 8.7
Seller Details
Seller
Box
Year Founded
1998
HQ Location
Redwood City, CA
Twitter
@Box
76,860 Twitter followers
LinkedIn® Page
www.linkedin.com
4,039 employees on LinkedIn®
Ownership
NYSE:BOX
(46)4.3 out of 5
9th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HashiCorp Vault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Management
    1
    Integrations
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    8.7
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    7.7
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    100,652 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,343 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
HashiCorp Vault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Integrations
1
Easy Management
1
Integrations
1
Cons
Expensive
1
HashiCorp Vault features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
8.7
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
7.7
Ease of Use
Average: 8.7
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
100,652 Twitter followers
LinkedIn® Page
www.linkedin.com
2,343 employees on LinkedIn®
Ownership
NASDAQ: HCP
(17)4.6 out of 5
3rd Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IXOPAY features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TokenEx
    Year Founded
    2010
    HQ Location
    Edmond, Oklahoma
    Twitter
    @TokenEx
    1,213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 41% Mid-Market
IXOPAY features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.3
Ease of Use
Average: 8.7
Seller Details
Seller
TokenEx
Year Founded
2010
HQ Location
Edmond, Oklahoma
Twitter
@TokenEx
1,213 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
(40)4.7 out of 5
7th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and m

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenSSH features and usability ratings that predict user satisfaction
    9.6
    Regional Support
    Average: 8.6
    8.8
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenBSD
    Year Founded
    1995
    HQ Location
    Alberta, Canada
    Twitter
    @OpenBSD_CVS
    495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and m

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 23% Enterprise
OpenSSH features and usability ratings that predict user satisfaction
9.6
Regional Support
Average: 8.6
8.8
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.8
Ease of Use
Average: 8.7
Seller Details
Seller
OpenBSD
Year Founded
1995
HQ Location
Alberta, Canada
Twitter
@OpenBSD_CVS
495 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®

Learn More About Encryption Key Management Software

What is Encryption Key Management Software?

Encryption key management software assists companies with protecting and managing their cryptographic keys used for encrypting data on devices and in applications. Encryption key management software manages encryption keys throughout a key pair’s lifecycle, which includes key generation, exchange, use, integrity, availability, storage, backup or archive, revocation, and deregistration or destruction. On the backend, these tools manage encryption key generation, distribution, and replacement, while on the client side, the tools inject encryption keys and store and manage them on devices. These software solutions protect the keys by ensuring that only authenticated and authorized users can access them, preventing them from being disclosed, lost, misused, or intercepted by unauthorized parties.

What Do KMS and HSM Stand For?

KMS stands for key management systems. Key management systems are centralized hubs that manage the key lifecycle, including generation, certification, storage, usage, expiration, revocation, and retirement. Centralized key management systems work in conjunction with hardware security modules (HSMs). KMS may also be known by the following acronyms: CKMS, which is cryptographic key management system, or EKMS, which stands for enterprise key management system.

HSM stands for hardware security modules. Hardware security modules are servers built to be tamper-resistant or tamper-proof. HSMs generate, retrieve, share, and protect keys. These are considered the most secure key storage as these are physically built to prevent tampering by using special tamper-resistant screws and sealants.

What Types of Encryption Key Management Software Exist?

On-premises encryption key management

Some companies opt to store their key manager on-premises using a hardware security module (HSM), which is a server built to be tamper-resistant or tamper-proof. 


Cloud-based encryption key management

Some companies have complex key management needs and need a solution that scales to meet the volume and complexity of their encryption key transaction needs. Centralized cloud-based encryption key management can assist with symmetric and asymmetric key management and work with various databases, applications, and standards. Bring your own encryption (BYOE) or bring your own key (BYOK) is akin to the bring your own device (BYOD) security models—companies bring their own encryption key management software to deploy on public cloud infrastructure. However, this security model has trade-offs as this may entail giving cloud providers access to keys, which may not meet a company’s security policies. 

Key management as a service

Some cloud providers offer their own key management as a service solution in their cloud environments.

What are the Common Features of Encryption Key Management Software?

The following are some core features within encryption key management software:

Interoperability: For companies that use multiple types of cryptographic keys and multiple software applications, interoperability is important. Many encryption key management solutions are based on standard protocols, including Key Management Interoperability Protocol (KMIP) standard or Public Key Crypto Standard (PKCS 11). Other solutions will rely on closed-source key management.

Policy management: Companies may have specific policies for their encryption keys, including when to expire or revoke them or methods to prevent sharing the keys. Encryption key management software will enforce these policies.

Access management: In addition to creating and managing the keys themselves, it is important to manage who has access permissions to those keys. Many companies employ a least-privilege policy where users and systems have the least access needed to achieve their role function. Encryption key management solutions can enforce those policies, ensuring that only authorized and authenticated users or systems have access to the keys can prevent misuse. These tools will also provide access and audit logs.

Backup: If the keys are lost, access to the encrypted data will be unrecoverable without backup. Many encryption key management solutions offer backup features.

What are the Benefits of Encryption Key Management Software?

If not properly managed, encryption keys can fall into the wrong hands and be used to decrypt sensitive data. This can risk sensitive encrypted data or disrupt critical business information access. Managing encryption keys manually can be challenging to meet today’s business needs as the scale and complexity of applications used and the encryption and keys needed to secure those have grown, which is why many companies have opted for automated management solutions. If data encryption key management is managed manually, this time-consuming task may come at the expense of speed, availability, interoperability, accuracy, and integrity. 

Security: The main purpose of encryption and, therefore, encryption key management is security. Encryption key management software assists in managing encryption keys at scale in a secure manner and remains available to meet business needs.

Meeting regulatory compliance: Some highly regulated industries are bound by various data protection regulations for storing and managing encryption keys. Using encryption key management software, companies can meet requirements of regulations such as PCI DSS 3.2.1, NIST 800-53, and NIST 800-57.

Scalability: Today’s businesses rely on multiple devices and applications needing encryption, meaning they need an encryption key management solution that scales at speed to generate, distribute, and manage the keys. This can mean the ability to generate hundreds of keys per minute. Many businesses require low latency and high availability for their keys.

Who Uses Encryption Key Management Software?

Information security professionals: Information security professionals use encryption key management solutions which may include on-premises solutions like HSMs, centralized cloud-based solutions, or cloud-infrastructure-specific software-as-a-service solutions.

IT professionals: If a company does not have a dedicated information security (infosec) team, the responsibility for managing encryption keys falls on information technology (IT) teams.

Software Related to Encryption Key Management Software

Related solutions that can be used together with or as an alternative encryption key management software include:

Encryption software: Companies use encryption software to protect the confidentiality and integrity of their data. Encryption software will turn plaintext into cipher text using encryption. Keys to unencrypt the data will be stored using encryption key management solutions.

Email encryption software: To protect the confidentiality of data in transit, companies use email encryption software. Companies can use encryption key management solutions to protect the encryption keys. 

Certificate lifecycle management (CLM) software: Public key infrastructure (PKI) is an asymmetric encryption key management system that utilizes digital certificates such as SSL or TLS certificates and public keys to secure assets like website traffic.

Secrets management tools: Developer and DevOps teams, in particular, may utilize secrets management tools to store sensitive digital assets, such as encryption keys.

Challenges with Encryption Key Management Software

BYOE or BYOK: Companies must carefully understand who has access to their encryption keys. When utilizing a BYOE or BYOK security model, it is important to know who has access to the keys, including providers.

Scalability and availability: It is important to ensure that generating, managing, utilizing, and retiring encryption keys meets your company’s scale and availability requirements.

Backup: If encryption keys are lost, companies must have a backup plan. Ensure the software solution you are evaluating meets your specific backup needs.

Regionality: Some geographic areas have data sovereignty and data residency requirements, so encryption keys may be managed differently based on the regional requirements.

Governance: Some data may be governed by data protection regulations, and a company’s encryption and encryption key management policies may need to meet specific regulatory compliance needs.

How to Buy Encryption Key Management Software

Requirements Gathering (RFI/RFP) for Encryption Key Management Software

Gather your company’s specific encryption key management requirements, including if you need to manage your encryption keys on-premises, with a centralized cloud key management offering, or using an infrastructure-specific encryption key management service. It is important to determine what kind of interoperability you require. Also, consider the scale at which you need keys deployed and managed and the availability you seek. Discuss your backup needs. Authentication and access control functionality is also important. And determine which geographic areas your business needs are, and be sure to speak with vendors about these requirements.

Compare Encryption Key Management Software Products

Create a long list

The long list should include a list of providers that meet your basic interoperability, hosting, scale, regionality, and functionality requirements. Companies can identify products by using software review sites like G2.com to review what users of those solutions like and dislike, along with rankings on six satisfaction metrics.

Create a short list

Shorten your long list by identifying must-have functionality. Factors to consider at this stage include integrations, price, and whether the solution meets your regulatory requirements.

Conduct demos

When conducting demos of each potential solution, it is important to ask questions about the user interface, the ease of use, and the skills required to operate the encryption key management solution. The company’s staff should be able to learn the functionality of the tool quickly to receive the fastest return on investment.

Selection of Encryption Key Management Software

Choose a selection team

The selection team should include employees using the encryption key management tool in their daily duties and understand the use case. These would typically be colleagues from information security (Infosec) and information technology (IT) teams. Other parties from leadership and finance should also be included.

Negotiation

Security products such as encryption key management tools help companies manage risk. Knowing the cost of a breach or exposed keys to an organization can help your company understand the value these tools bring to your company. Understand what your budget is with this in mind.  

Final decision

Colleagues who work on defining and managing the company’s data security policies and programs are in the best position to decide which software solution fits the organization’s needs. These professionals will have the most experience with cryptography tools and can best evaluate the products.