Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.
Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.
Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.
To qualify for inclusion in the Encryption Key Management category, a product must:
Encryption Key Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type – including PCI, PII, PHI and even unstructured data formats – and integrate with nearly any processor or endpoint.
HashiCorp Vault enables organizations to securely secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data across multiple clouds. Vault secrets management centrally manages and enforces access to secrets and systems based on a trusted a trusted source of application and user identity. Governance features enable security teams to control these identities for different teams. Additionally, Vault handles multi-datacenter replication and disaster recovery so you can maintain continuous and agile application delivery.
Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to properly manage secrets of all kinds, including API and encryption keys. Lockr's key management solution-as-a-service protects against critical vulnerabilities, delivers best-practice security to help sites comply with many industry regulations, and provides a Defense in Depth approach to securing your data. Lockr is affordable, enterprise-grade key management.
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Benefits of Key Manager Plus 1. Gain complete visibility of all SSH keys and SSL certificates present in the organization and achieve centralized control. 2. Remove all existing public key-user trust relationships and generate new key pairs. Deploy the new public keys to users in bulk with just a couple of clicks. 3. Tighten security by periodically rotating keys and prevent their misuse. 4. Launch direct connections to remote devices by using the keys present in Key Manager Plus, saving time and enhancing productivity. 5. Delete any unwanted keys from the database, terminate access immediately, and prevent violations by obsolete accounts. 6. Get customizable, recurring notifications when the validity of an SSL certificate is about to expire. 7. Eliminate service downtime or display of error messages due to expired/invalid/rogue SSL certificates.
Ekran System® is a universal insider threat protection platform helping business with employee monitoring, subcontractor control, PAM, and compliance tasks. The software platform delivers monitoring, recording and auditing of all user activity on critical endpoints, critical data and critical configurations. Per-session indexed video records is the core format. Detection capabilities are implemented in complex alerting system, that detects anomalies, flags risky actions, and provides all needed context for adequate response. To prevent insider threats, the platform includes toolsets for both manual and automated incident response, such as user warning, user blocking, activity termination, USB device alerting and blocking. Ekran System® provides easy to use access management solutions such as two-factor authentication, one-time passwords, privileged account and session management (PASM), ticketing system integrations, and others. They were designed to bring privileged activity control to the next level and meet compliance requirements. The platform has a flexible licensing system, thus giving you an integrated solution to build your security strategy within your budget.
HyTrust KeyControl simplifies the process of key management for applications that do not require sophisticated policy based key management – but still need to perform to scale to enterprise grade level performance. And HyTrust KeyControl does this without costly physical appliances or license fees.
Complete vendor-independent key management solution.
Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.