Alibaba Key Management Service Reviews & Product Details

Alibaba Key Management Service Overview

What is Alibaba Key Management Service?

Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

Alibaba Key Management Service Details
Product Description

Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data


Seller Details
Seller
Alibaba
Ownership
HKG:9988
Company Website
Year Founded
2009
HQ Location
Hangzhou , China
Total Revenue (USD mm)
$376,844
Twitter
@alibaba_cloud
54,056 Twitter followers
LinkedIn® Page
www.linkedin.com
4,122 employees on LinkedIn®
Show More
Answer a few questions to help the Alibaba Key Management Service community
Have you used Alibaba Key Management Service before?
Yes

Alibaba Key Management Service Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 1 Alibaba Key Management Service review
Showing 1 review
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
All Industries
Region
Already have Alibaba Key Management Service?
Write a Review
Senior Software Programmer
Computer Software
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Invitation from G2
What do you like best?

KMS is an extremely dynamic and versatile service of Alibaba, because it allows you to create keys in a simple way, as well as eliminate and manage these, it has an easy administration of these keys, since it is based on encryption and decryption by keys Client teachers, that is, CMK, gives us the option to manage the keys in the scenario that best suits our needs either through API or in the same console which has a very simple and organized interface which makes its handling is very simple so I consider that anyone with basic knowledge in this field may be able to handle this service, in addition to allowing that product to be integrated with other services so that we can obtain the encryption of extremely important information in a way so that the security of each of our data is guaranteed, since in general this service can be used for various roles as well as for developers and websites, services or security directors so I consider it one of those services that are indispensable at all times especially at the business level. Review collected by and hosted on G2.com.

What do you dislike?

The only drawback with this product is that it has some limitations, being the main one that is only available per region, so according to the region in which the user is located, there will be different limits or advantages. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

This software is useful for any company or user that wishes to keep their data confidential because it allows the management of keys that can be encrypted or decrypted according to when you want to use them, it is easy to use and manage because it is you who decides where you can manage them either in an API or in Alibaba own console. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

This Alibaba software is very useful because we can use it to grant keys to the programs so that we can encrypt or decrypt it whenever we want regardless of where it is running, this guarantees us the security of our applications, since the confidentiality and integrity of it is maintained, it is also useful for the protection of the data that is stored at the enterprise level since we can create policies for the encryption of the same. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Alibaba Key Management Service for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.3
(631)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
OpenSSH Logo
OpenSSH
4.7
(39)
OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.
3
HashiCorp Vault Logo
HashiCorp Vault
4.3
(30)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
4
Azure Key Vault Logo
Azure Key Vault
4.2
(29)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
5
AWS Key Management Service (KMS) Logo
AWS Key Management Service (KMS)
4.3
(27)
AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.
6
Keyfactor Command Logo
Keyfactor Command
4.5
(21)
Keyfactor Command, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.
7
TokenEx Logo
TokenEx
4.6
(17)
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.
8
AWS CloudHSM Logo
AWS CloudHSM
4.3
(12)
AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.
9
GnuPG Logo
GnuPG
4.2
(11)
GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.
10
Vormetric Data Security Platform Logo
Vormetric Data Security Platform
3.8
(2)
Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.
Show More