Google Cloud Key Management
Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements:
Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
Learn more
WinMagic SecureDoc
SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux).
Learn more
Yandex Key Management Service
Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
Learn more
J-KMS
JISA Softech's J-KMS is a centralized key management system designed to streamline the management of cryptographic keys across various business applications. It automates key updates and distribution, handling the entire lifecycle of both symmetric and asymmetric keys. J-KMS enforces specific roles and responsibilities for key sets, reducing manual tasks and allowing staff to focus on policy decisions. It supports standard key formats and ensures compliance with standards like PCI-DSS and GDPR. Key functions include key generation, backup, restoration, distribution, import/export, audit logging, encryption using Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), and certification with X.509 or EMV certificates. Benefits of J-KMS encompass reduced human error through user and admin permissions, streamlined processes, cost reduction via automation, dual control with asynchronous workflows, tamper-evident records for compliance, and system-wide key control for any key type and format.
Learn more