Introducing G2.ai, the future of software buying.Try now

Best Encryption Key Management Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.

Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.

Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.

To qualify for inclusion in the Encryption Key Management category, a product must:

Provide compliance management capabilities for encryption keys
Include key storage and backup functionality
Enforce security policies related to key storage and distribution
Show More
Show Less

Best Encryption Key Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Encryption Key Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
69 Listings in Encryption Key Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 45% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureKey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    2
    Convenience
    1
    Customer Support
    1
    Privacy
    1
    Cons
    Difficult Learning Process
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Toronto, ON
    Twitter
    @SecureKey
    2,612 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 45% Small-Business
  • 31% Mid-Market
SecureKey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
2
Convenience
1
Customer Support
1
Privacy
1
Cons
Difficult Learning Process
1
Expensive
1
SecureKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.1
Ease of Use
Average: 8.7
Seller Details
Year Founded
2008
HQ Location
Toronto, ON
Twitter
@SecureKey
2,612 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GnuPG features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GnuPG
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 36% Small-Business
GnuPG features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.1
Ease of Use
Average: 8.7
Seller Details
Seller
GnuPG
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 78% Enterprise
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vormetric Data Security Platform features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    9.2
    Scalability
    Average: 8.7
    9.6
    API/Integrations
    Average: 8.5
    7.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,879 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,279 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

Users
No information available
Industries
No information available
Market Segment
  • 78% Enterprise
  • 22% Mid-Market
Vormetric Data Security Platform features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
9.2
Scalability
Average: 8.7
9.6
API/Integrations
Average: 8.5
7.3
Ease of Use
Average: 8.7
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,879 Twitter followers
LinkedIn® Page
www.linkedin.com
1,279 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(7)4.4 out of 5
View top Consulting Services for Google Cloud HSM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 cer

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Enterprise
    • 43% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud HSM features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.0
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,497,617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 cer

Users
No information available
Industries
No information available
Market Segment
  • 57% Enterprise
  • 43% Small-Business
Google Cloud HSM features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.0
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,497,617 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeyScaler features and usability ratings that predict user satisfaction
    9.2
    Regional Support
    Average: 8.6
    9.2
    Scalability
    Average: 8.7
    9.2
    API/Integrations
    Average: 8.5
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Reading, Berkshire
    Twitter
    @DeviceAuthority
    2,649 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 38% Small-Business
KeyScaler features and usability ratings that predict user satisfaction
9.2
Regional Support
Average: 8.6
9.2
Scalability
Average: 8.7
9.2
API/Integrations
Average: 8.5
9.3
Ease of Use
Average: 8.7
Seller Details
Year Founded
2014
HQ Location
Reading, Berkshire
Twitter
@DeviceAuthority
2,649 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offer

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Key Lifecycle Manager features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    6.7
    API/Integrations
    Average: 8.5
    7.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offer

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
IBM Guardium Key Lifecycle Manager features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
6.7
API/Integrations
Average: 8.5
7.5
Ease of Use
Average: 8.7
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,117 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales Data Protection on Demand features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,879 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,279 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Thales Data Protection on Demand features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.7
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,879 Twitter followers
LinkedIn® Page
www.linkedin.com
1,279 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ubiq Encryption Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Efficiency
    2
    Automation
    1
    Customer Support
    1
    Data Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ubiq Encryption Platform features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    San Diego, US
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Enterprise
Ubiq Encryption Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Efficiency
2
Automation
1
Customer Support
1
Data Protection
1
Cons
This product has not yet received any negative sentiments.
Ubiq Encryption Platform features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.7
Seller Details
Year Founded
2013
HQ Location
San Diego, US
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Enterprise
    • 18% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity Field Encryption features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    492 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

Users
No information available
Industries
No information available
Market Segment
  • 73% Enterprise
  • 18% Small-Business
iSecurity Field Encryption features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.7
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
492 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged credentials are some of the highest-value targets for cybercriminals. Keeper Secrets Manager is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets s

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Small-Business
    • 13% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Secrets Manager features and usability ratings that predict user satisfaction
    7.8
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.4
    API/Integrations
    Average: 8.5
    9.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,989 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    688 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged credentials are some of the highest-value targets for cybercriminals. Keeper Secrets Manager is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets s

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Small-Business
  • 13% Enterprise
Keeper Secrets Manager features and usability ratings that predict user satisfaction
7.8
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.4
API/Integrations
Average: 8.5
9.4
Ease of Use
Average: 8.7
Seller Details
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,989 Twitter followers
LinkedIn® Page
www.linkedin.com
688 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    3.3
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,869 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    550 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
3.3
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,869 Twitter followers
LinkedIn® Page
www.linkedin.com
550 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ONTAP Data Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Data Protection
    2
    Data Security
    2
    Encryption
    2
    Malware Protection
    2
    Cons
    Complexity
    3
    Complexity Issues
    2
    Expensive
    2
    Complex Configuration
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ONTAP Data Security features and usability ratings that predict user satisfaction
    9.2
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetApp
    Year Founded
    1992
    HQ Location
    Sunnyvale, California
    Twitter
    @NetApp
    118,581 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,657 employees on LinkedIn®
    Ownership
    NASDAQ
Product Description
How are these determined?Information
This description is provided by the seller.

Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
ONTAP Data Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Data Protection
2
Data Security
2
Encryption
2
Malware Protection
2
Cons
Complexity
3
Complexity Issues
2
Expensive
2
Complex Configuration
1
Complex Setup
1
ONTAP Data Security features and usability ratings that predict user satisfaction
9.2
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.7
Seller Details
Seller
NetApp
Year Founded
1992
HQ Location
Sunnyvale, California
Twitter
@NetApp
118,581 Twitter followers
LinkedIn® Page
www.linkedin.com
12,657 employees on LinkedIn®
Ownership
NASDAQ
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alibaba Key Management Service features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alibaba
    HQ Location
    Hangzhou
    Twitter
    @alibaba_cloud
    1,050,699 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,764 employees on LinkedIn®
    Ownership
    BABA
    Total Revenue (USD mm)
    $509,711
Product Description
How are these determined?Information
This description is provided by the seller.

Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Alibaba Key Management Service features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.7
Seller Details
Seller
Alibaba
HQ Location
Hangzhou
Twitter
@alibaba_cloud
1,050,699 Twitter followers
LinkedIn® Page
www.linkedin.com
4,764 employees on LinkedIn®
Ownership
BABA
Total Revenue (USD mm)
$509,711
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EncryptRIGHT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1981
    HQ Location
    Eugene, Oregon, United States
    Twitter
    @Prime_Factors
    218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
EncryptRIGHT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.7
Seller Details
Year Founded
1981
HQ Location
Eugene, Oregon, United States
Twitter
@Prime_Factors
218 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enables competitively-sensitive parties to exchange information directly, and in a fundamentally new way.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Spring Labs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Data Transfer
    1
    Reliability
    1
    Simple
    1
    Cons
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Spring Labs features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2025
    HQ Location
    Marina del Rey, US
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enables competitively-sensitive parties to exchange information directly, and in a fundamentally new way.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Spring Labs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Data Transfer
1
Reliability
1
Simple
1
Cons
Poor Documentation
1
Spring Labs features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.9
Ease of Use
Average: 8.7
Seller Details
Year Founded
2025
HQ Location
Marina del Rey, US
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®