KMS is an extremely dynamic and versatile service of Alibaba, because it allows you to create keys in a simple way, as well as eliminate and manage these, it has an easy administration of these keys, since it is based on encryption and decryption by keys Client teachers, that is, CMK, gives us the option to manage the keys in the scenario that best suits our needs either through API or in the same console which has a very simple and organized interface which makes its handling is very simple so I consider that anyone with basic knowledge in this field may be able to handle this service, in addition to allowing that product to be integrated with other services so that we can obtain the encryption of extremely important information in a way so that the security of each of our data is guaranteed, since in general this service can be used for various roles as well as for developers and websites, services or security directors so I consider it one of those services that are indispensable at all times especially at the business level. Review collected by and hosted on G2.com.
What do you dislike?
The only drawback with this product is that it has some limitations, being the main one that is only available per region, so according to the region in which the user is located, there will be different limits or advantages. Review collected by and hosted on G2.com.
Recommendations to others considering the product:
This software is useful for any company or user that wishes to keep their data confidential because it allows the management of keys that can be encrypted or decrypted according to when you want to use them, it is easy to use and manage because it is you who decides where you can manage them either in an API or in Alibaba own console. Review collected by and hosted on G2.com.
What problems are you solving with the product? What benefits have you realized?
This Alibaba software is very useful because we can use it to grant keys to the programs so that we can encrypt or decrypt it whenever we want regardless of where it is running, this guarantees us the security of our applications, since the confidentiality and integrity of it is maintained, it is also useful for the protection of the data that is stored at the enterprise level since we can create policies for the encryption of the same. Review collected by and hosted on G2.com.