Introducing G2.ai, the future of software buying.Try now

Best Encryption Key Management Software

Lauren Worth
LW
Researched and written by Lauren Worth

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.

Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.

Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.

To qualify for inclusion in the Encryption Key Management category, a product must:

Provide compliance management capabilities for encryption keys
Include key storage and backup functionality
Enforce security policies related to key storage and distribution

Best Encryption Key Management Software At A Glance

Leader:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
68 Listings in Encryption Key Management Available
(1,033)4.4 out of 5
Optimized for quick response
1st Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

    Users
    • Project Manager
    • Assistant Manager
    Industries
    • Marketing and Advertising
    • Construction
    Market Segment
    • 43% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Egnyte Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    65
    File Sharing
    42
    Easy Sharing
    36
    Security
    31
    Easy Access
    26
    Cons
    File Management
    9
    Slow Processing
    9
    Slow Performance
    8
    Expensive
    6
    Limited Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Egnyte features and usability ratings that predict user satisfaction
    9.1
    Regional Support
    Average: 8.6
    9.1
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Egnyte
    Company Website
    Year Founded
    2008
    HQ Location
    Mountain View, CA
    Twitter
    @Egnyte
    16,313 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,204 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

Users
  • Project Manager
  • Assistant Manager
Industries
  • Marketing and Advertising
  • Construction
Market Segment
  • 43% Small-Business
  • 39% Mid-Market
Egnyte Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
65
File Sharing
42
Easy Sharing
36
Security
31
Easy Access
26
Cons
File Management
9
Slow Processing
9
Slow Performance
8
Expensive
6
Limited Features
6
Egnyte features and usability ratings that predict user satisfaction
9.1
Regional Support
Average: 8.6
9.1
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.8
Seller Details
Seller
Egnyte
Company Website
Year Founded
2008
HQ Location
Mountain View, CA
Twitter
@Egnyte
16,313 Twitter followers
LinkedIn® Page
www.linkedin.com
1,204 employees on LinkedIn®
(23)4.6 out of 5
View top Consulting Services for Google Cloud Key Management Service
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Manage encryption keys on Google Cloud Platform

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 39% Enterprise
    • 22% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Key Management Service features and usability ratings that predict user satisfaction
    7.7
    Regional Support
    Average: 8.6
    8.6
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Manage encryption keys on Google Cloud Platform

Users
No information available
Industries
No information available
Market Segment
  • 39% Enterprise
  • 22% Small-Business
Google Cloud Key Management Service features and usability ratings that predict user satisfaction
7.7
Regional Support
Average: 8.6
8.6
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(57)4.4 out of 5
5th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Sec

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Accounting
    Market Segment
    • 47% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Key Vault features and usability ratings that predict user satisfaction
    8.9
    Regional Support
    Average: 8.6
    8.9
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Sec

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Accounting
Market Segment
  • 47% Enterprise
  • 25% Small-Business
Azure Key Vault features and usability ratings that predict user satisfaction
8.9
Regional Support
Average: 8.6
8.9
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.5
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(57)4.8 out of 5
2nd Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 84% Small-Business
    • 16% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppler secrets management platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Easy Integrations
    9
    Integrations
    6
    Flexibility
    5
    Security
    4
    Cons
    Expensive
    5
    Complex Setup
    3
    Setup Difficulty
    3
    Poor Navigation
    2
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    7.6
    Regional Support
    Average: 8.6
    9.5
    Scalability
    Average: 8.7
    9.3
    API/Integrations
    Average: 8.5
    9.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 84% Small-Business
  • 16% Mid-Market
Doppler secrets management platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Easy Integrations
9
Integrations
6
Flexibility
5
Security
4
Cons
Expensive
5
Complex Setup
3
Setup Difficulty
3
Poor Navigation
2
Dependency Issues
1
Doppler secrets management platform features and usability ratings that predict user satisfaction
7.6
Regional Support
Average: 8.6
9.5
Scalability
Average: 8.7
9.3
API/Integrations
Average: 8.5
9.5
Ease of Use
Average: 8.8
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,378 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
(76)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Akeyless Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Customer Support
    10
    Security
    10
    Secure Storage
    5
    Easy Integrations
    4
    Cons
    Poor UI
    3
    Authentication Issues
    2
    Documentation
    2
    Lack of Features
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akeyless Platform features and usability ratings that predict user satisfaction
    9.1
    Regional Support
    Average: 8.6
    9.3
    Scalability
    Average: 8.7
    8.4
    API/Integrations
    Average: 8.5
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akeyless
    Company Website
    Year Founded
    2018
    HQ Location
    Ramat Gan, Israel
    Twitter
    @akeylessio
    260 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 30% Mid-Market
Akeyless Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Customer Support
10
Security
10
Secure Storage
5
Easy Integrations
4
Cons
Poor UI
3
Authentication Issues
2
Documentation
2
Lack of Features
2
Learning Curve
2
Akeyless Platform features and usability ratings that predict user satisfaction
9.1
Regional Support
Average: 8.6
9.3
Scalability
Average: 8.7
8.4
API/Integrations
Average: 8.5
8.9
Ease of Use
Average: 8.8
Seller Details
Seller
Akeyless
Company Website
Year Founded
2018
HQ Location
Ramat Gan, Israel
Twitter
@akeylessio
260 Twitter followers
LinkedIn® Page
www.linkedin.com
95 employees on LinkedIn®
(36)4.3 out of 5
View top Consulting Services for Oracle Cloud Infrastructure Vault
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Cloud Infrastructure Vault features and usability ratings that predict user satisfaction
    8.2
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.3
    API/Integrations
    Average: 8.5
    8.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    204,855 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Cloud Infrastructure Key Management is a managed service that enables you to encrypt your data using keys that you control.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 31% Enterprise
Oracle Cloud Infrastructure Vault features and usability ratings that predict user satisfaction
8.2
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.3
API/Integrations
Average: 8.5
8.4
Ease of Use
Average: 8.8
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,135 Twitter followers
LinkedIn® Page
www.linkedin.com
204,855 employees on LinkedIn®
Ownership
NYSE:ORCL
(56)4.5 out of 5
11th Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 82% Enterprise
    • 13% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    8.8
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Company Website
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,763 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 82% Enterprise
  • 13% Mid-Market
Keyfactor Command features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
8.8
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.2
Ease of Use
Average: 8.8
Seller Details
Seller
Keyfactor
Company Website
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,763 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
(45)4.3 out of 5
8th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    8.7
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    7.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    98,579 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,529 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
8.7
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
7.6
Ease of Use
Average: 8.8
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
98,579 Twitter followers
LinkedIn® Page
www.linkedin.com
2,529 employees on LinkedIn®
Ownership
NASDAQ: HCP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Box KeySafe features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Box
    Year Founded
    1998
    HQ Location
    Redwood City, CA
    Twitter
    @Box
    76,835 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,872 employees on LinkedIn®
    Ownership
    NYSE:BOX
Product Description
How are these determined?Information
This description is provided by the seller.

With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Enterprise
Box KeySafe features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
Box
Year Founded
1998
HQ Location
Redwood City, CA
Twitter
@Box
76,835 Twitter followers
LinkedIn® Page
www.linkedin.com
3,872 employees on LinkedIn®
Ownership
NYSE:BOX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 19% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Key Management Service (KMS) features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    9.2
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    8.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,229,471 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,150 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 19% Mid-Market
AWS Key Management Service (KMS) features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
9.2
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
8.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,229,471 Twitter followers
LinkedIn® Page
www.linkedin.com
143,150 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(17)4.6 out of 5
3rd Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IXOPAY features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TokenEx
    Year Founded
    2010
    HQ Location
    Edmond, Oklahoma
    Twitter
    @TokenEx
    1,211 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channel

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 41% Mid-Market
IXOPAY features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.3
Ease of Use
Average: 8.8
Seller Details
Seller
TokenEx
Year Founded
2010
HQ Location
Edmond, Oklahoma
Twitter
@TokenEx
1,211 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure confidential computing offers solutions to enable the isolation your sensitive data while it's being processed in the cloud. Learn how to create and deploy applications based on confidential com

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Confidential Computing features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure confidential computing offers solutions to enable the isolation your sensitive data while it's being processed in the cloud. Learn how to create and deploy applications based on confidential com

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 33% Small-Business
Azure Confidential Computing features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(82)4.5 out of 5
10th Easiest To Use in Encryption Key Management software
View top Consulting Services for Salesforce Shield
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    15
    Privacy Management
    15
    Data Security
    11
    Access Control
    7
    Cons
    Learning Curve
    6
    Performance Issues
    5
    Access Control Issues
    4
    Complexity
    4
    Complexity Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Shield features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    583,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,342 employees on LinkedIn®
    Ownership
    NYSE:CRM
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 32% Enterprise
Salesforce Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
15
Privacy Management
15
Data Security
11
Access Control
7
Cons
Learning Curve
6
Performance Issues
5
Access Control Issues
4
Complexity
4
Complexity Issues
4
Salesforce Shield features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.7
Ease of Use
Average: 8.8
Seller Details
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
583,254 Twitter followers
LinkedIn® Page
www.linkedin.com
78,342 employees on LinkedIn®
Ownership
NYSE:CRM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 31% Enterprise
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS CloudHSM features and usability ratings that predict user satisfaction
    6.7
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.2
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,229,471 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,150 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

Users
No information available
Industries
No information available
Market Segment
  • 31% Enterprise
  • 31% Small-Business
AWS CloudHSM features and usability ratings that predict user satisfaction
6.7
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.2
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,229,471 Twitter followers
LinkedIn® Page
www.linkedin.com
143,150 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(40)4.7 out of 5
6th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and m

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenSSH features and usability ratings that predict user satisfaction
    9.6
    Regional Support
    Average: 8.6
    8.8
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenBSD
    Year Founded
    1995
    HQ Location
    Alberta, Canada
    Twitter
    @OpenBSD_CVS
    495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and m

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
OpenSSH features and usability ratings that predict user satisfaction
9.6
Regional Support
Average: 8.6
8.8
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
OpenBSD
Year Founded
1995
HQ Location
Alberta, Canada
Twitter
@OpenBSD_CVS
495 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
(346)4.4 out of 5
Optimized for quick response
4th Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Starting at $119.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

    Users
    • IT Manager
    Industries
    • Hospital & Health Care
    • Health, Wellness and Fitness
    Market Segment
    • 46% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Virtru Email Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Security
    47
    Encryption
    33
    Protection
    25
    Secure Sharing
    25
    Cons
    Email Issues
    33
    Email Encryption Issues
    25
    Access Issues
    14
    Encryption Issues
    13
    Technical Issues
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtru Email Encryption features and usability ratings that predict user satisfaction
    7.8
    Regional Support
    Average: 8.6
    7.8
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Virtru
    Company Website
    Year Founded
    2012
    HQ Location
    Washington, DC
    Twitter
    @virtruprivacy
    1,789 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    196 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

Users
  • IT Manager
Industries
  • Hospital & Health Care
  • Health, Wellness and Fitness
Market Segment
  • 46% Mid-Market
  • 38% Small-Business
Virtru Email Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Security
47
Encryption
33
Protection
25
Secure Sharing
25
Cons
Email Issues
33
Email Encryption Issues
25
Access Issues
14
Encryption Issues
13
Technical Issues
11
Virtru Email Encryption features and usability ratings that predict user satisfaction
7.8
Regional Support
Average: 8.6
7.8
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.1
Ease of Use
Average: 8.8
Seller Details
Seller
Virtru
Company Website
Year Founded
2012
HQ Location
Washington, DC
Twitter
@virtruprivacy
1,789 Twitter followers
LinkedIn® Page
www.linkedin.com
196 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 45% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureKey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    2
    Convenience
    1
    Customer Support
    1
    Privacy
    1
    Cons
    Difficult Learning Process
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Toronto, ON
    Twitter
    @SecureKey
    2,637 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 45% Small-Business
  • 31% Mid-Market
SecureKey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
2
Convenience
1
Customer Support
1
Privacy
1
Cons
Difficult Learning Process
1
Expensive
1
SecureKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.1
Ease of Use
Average: 8.8
Seller Details
Year Founded
2008
HQ Location
Toronto, ON
Twitter
@SecureKey
2,637 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GnuPG features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GnuPG
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 36% Small-Business
GnuPG features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.1
Ease of Use
Average: 8.8
Seller Details
Seller
GnuPG
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 70% Enterprise
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vormetric Data Security Platform features and usability ratings that predict user satisfaction
    9.0
    Regional Support
    Average: 8.6
    9.3
    Scalability
    Average: 8.7
    9.7
    API/Integrations
    Average: 8.5
    7.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

Users
No information available
Industries
No information available
Market Segment
  • 70% Enterprise
  • 20% Mid-Market
Vormetric Data Security Platform features and usability ratings that predict user satisfaction
9.0
Regional Support
Average: 8.6
9.3
Scalability
Average: 8.7
9.7
API/Integrations
Average: 8.5
7.6
Ease of Use
Average: 8.8
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,798 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(6)4.4 out of 5
View top Consulting Services for Google Cloud HSM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 cer

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud HSM features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.6
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 cer

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Google Cloud HSM features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.6
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeyScaler features and usability ratings that predict user satisfaction
    9.2
    Regional Support
    Average: 8.6
    9.2
    Scalability
    Average: 8.7
    9.2
    API/Integrations
    Average: 8.5
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Reading, Berkshire
    Twitter
    @DeviceAuthority
    2,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 38% Small-Business
KeyScaler features and usability ratings that predict user satisfaction
9.2
Regional Support
Average: 8.6
9.2
Scalability
Average: 8.7
9.2
API/Integrations
Average: 8.5
9.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2014
HQ Location
Reading, Berkshire
Twitter
@DeviceAuthority
2,648 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offer

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Key Lifecycle Manager features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    6.7
    API/Integrations
    Average: 8.5
    7.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offer

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
IBM Guardium Key Lifecycle Manager features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
6.7
API/Integrations
Average: 8.5
7.5
Ease of Use
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales Data Protection on Demand features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Thales Data Protection on Demand features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,798 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ubiq Encryption Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Efficiency
    2
    Automation
    1
    Customer Support
    1
    Data Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ubiq Encryption Platform features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Enterprise
Ubiq Encryption Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Efficiency
2
Automation
1
Customer Support
1
Data Protection
1
Cons
This product has not yet received any negative sentiments.
Ubiq Encryption Platform features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • iSecurity Field Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Encryption Security
    2
    Affordable
    1
    Customer Support
    1
    Data Protection
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity Field Encryption features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    496 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

Users
No information available
Industries
No information available
Market Segment
  • 73% Enterprise
  • 18% Small-Business
iSecurity Field Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Encryption Security
2
Affordable
1
Customer Support
1
Data Protection
1
Cons
Slow Performance
1
iSecurity Field Encryption features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
496 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged credentials are some of the highest-value targets for cybercriminals. Keeper Secrets Manager is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets s

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Small-Business
    • 13% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Secrets Manager features and usability ratings that predict user satisfaction
    7.8
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.4
    API/Integrations
    Average: 8.5
    9.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,974 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    497 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged credentials are some of the highest-value targets for cybercriminals. Keeper Secrets Manager is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets s

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Small-Business
  • 13% Enterprise
Keeper Secrets Manager features and usability ratings that predict user satisfaction
7.8
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.4
API/Integrations
Average: 8.5
9.4
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,974 Twitter followers
LinkedIn® Page
www.linkedin.com
497 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    3.3
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
3.3
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ONTAP Data Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Data Protection
    2
    Data Security
    2
    Encryption
    2
    Malware Protection
    2
    Cons
    Complexity
    3
    Complexity Issues
    2
    Expensive
    2
    Complex Configuration
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ONTAP Data Security features and usability ratings that predict user satisfaction
    9.2
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetApp
    Year Founded
    1992
    HQ Location
    Sunnyvale, California
    Twitter
    @NetApp
    119,705 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,660 employees on LinkedIn®
    Ownership
    NASDAQ
Product Description
How are these determined?Information
This description is provided by the seller.

Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
ONTAP Data Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Data Protection
2
Data Security
2
Encryption
2
Malware Protection
2
Cons
Complexity
3
Complexity Issues
2
Expensive
2
Complex Configuration
1
Complex Setup
1
ONTAP Data Security features and usability ratings that predict user satisfaction
9.2
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
NetApp
Year Founded
1992
HQ Location
Sunnyvale, California
Twitter
@NetApp
119,705 Twitter followers
LinkedIn® Page
www.linkedin.com
12,660 employees on LinkedIn®
Ownership
NASDAQ
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alibaba Key Management Service features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alibaba
    HQ Location
    Hangzhou
    Twitter
    @alibaba_cloud
    1,059,398 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,580 employees on LinkedIn®
    Ownership
    BABA
    Total Revenue (USD mm)
    $509,711
Product Description
How are these determined?Information
This description is provided by the seller.

Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Alibaba Key Management Service features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Alibaba
HQ Location
Hangzhou
Twitter
@alibaba_cloud
1,059,398 Twitter followers
LinkedIn® Page
www.linkedin.com
4,580 employees on LinkedIn®
Ownership
BABA
Total Revenue (USD mm)
$509,711
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EncryptRIGHT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Eugene, OR
    Twitter
    @Prime_Factors
    214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
EncryptRIGHT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.8
Seller Details
HQ Location
Eugene, OR
Twitter
@Prime_Factors
214 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enables competitively-sensitive parties to exchange information directly, and in a fundamentally new way.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Spring Labs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Data Transfer
    1
    Reliability
    1
    Simple
    1
    Cons
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Spring Labs features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Marina del Rey, US
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enables competitively-sensitive parties to exchange information directly, and in a fundamentally new way.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Spring Labs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Data Transfer
1
Reliability
1
Simple
1
Cons
Poor Documentation
1
Spring Labs features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.9
Ease of Use
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
Marina del Rey, US
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    nShield hardware security modules (HSMs) provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales Hardware Security Modules (HSMs) features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    6.7
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

nShield hardware security modules (HSMs) provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more.

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Thales Hardware Security Modules (HSMs) features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
6.7
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,798 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
(1)4.5 out of 5
View top Consulting Services for Enterprise Encryption Management Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KAPALYA empowers organizations and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application. This ubiqu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Enterprise Encryption Management Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kapalya
    Year Founded
    2015
    HQ Location
    Berkeley, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

KAPALYA empowers organizations and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application. This ubiqu

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Enterprise Encryption Management Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Kapalya
Year Founded
2015
HQ Location
Berkeley, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust nShield as a Service is a subscription-based solution for generating, accessing, and protecting cryptographic key material, separately from sensitive data, using dedicated FIPS 140-2 Level 3 c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust nShield as a Service features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Scalability
    Average: 8.7
    6.7
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust nShield as a Service is a subscription-based solution for generating, accessing, and protecting cryptographic key material, separately from sensitive data, using dedicated FIPS 140-2 Level 3 c

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Entrust nShield as a Service features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Scalability
Average: 8.7
6.7
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,415 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EnvKey is a software that prevent insecure sharing and config sprawl. Works as an end-to-end encrypted configuration and secrets management.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EnvKey features and usability ratings that predict user satisfaction
    6.7
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Envkey
    Twitter
    @EnvkeyConfig
    484 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EnvKey is a software that prevent insecure sharing and config sprawl. Works as an end-to-end encrypted configuration and secrets management.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
EnvKey features and usability ratings that predict user satisfaction
6.7
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Envkey
Twitter
@EnvkeyConfig
484 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Equinix SmartKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Equinix
    Year Founded
    1998
    HQ Location
    Redwood City, California
    Twitter
    @Equinix
    27,370 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13,944 employees on LinkedIn®
    Ownership
    NASDAQ: EQIX
Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Equinix SmartKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Equinix
Year Founded
1998
HQ Location
Redwood City, California
Twitter
@Equinix
27,370 Twitter followers
LinkedIn® Page
www.linkedin.com
13,944 employees on LinkedIn®
Ownership
NASDAQ: EQIX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command for IoT features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,763 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Keyfactor Command for IoT features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.2
Ease of Use
Average: 8.8
Seller Details
Seller
Keyfactor
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,763 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to prop

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lockr features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @KeyLockr
    467 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to prop

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Lockr features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Seller Details
Twitter
@KeyLockr
467 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quick, secure PCI compliance, and much more. As easy as an API. Tokenization, data governance and access control, customer key management, fully customizable data schemas, REST and SQL APIs. Runs in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Payments Data Privacy Vault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Payments Data Privacy Vault features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Skyflow
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Quick, secure PCI compliance, and much more. As easy as an API. Tokenization, data governance and access control, customer key management, fully customizable data schemas, REST and SQL APIs. Runs in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Payments Data Privacy Vault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Security
1
Cons
This product has not yet received any negative sentiments.
Payments Data Privacy Vault features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Skyflow
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PK Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Affordable
    1
    Cybersecurity
    1
    Encryption
    1
    Encryption Security
    1
    Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PK Encryption features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PKWARE
    Year Founded
    1986
    HQ Location
    Milwaukee, WI
    Twitter
    @PKWARE
    1,148 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    155 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
PK Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Affordable
1
Cybersecurity
1
Encryption
1
Encryption Security
1
Features
1
Cons
This product has not yet received any negative sentiments.
PK Encryption features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
PKWARE
Year Founded
1986
HQ Location
Milwaukee, WI
Twitter
@PKWARE
1,148 Twitter followers
LinkedIn® Page
www.linkedin.com
155 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CipherTrust Cloud Key Manager (CCKM) simplifies management of cloud-native, BYOK, and HYOK keys from a single unified management console. Increase efficiency and operational resilience, and securely s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales CipherTrust Cloud Key Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

CipherTrust Cloud Key Manager (CCKM) simplifies management of cloud-native, BYOK, and HYOK keys from a single unified management console. Increase efficiency and operational resilience, and securely s

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Thales CipherTrust Cloud Key Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.7
Ease of Use
Average: 8.8
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,798 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absio moves data security to the top of the stack with application-level data security solutions and consulting services

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absio Broker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Absio
    HQ Location
    Denver, Colorado
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absio moves data security to the top of the stack with application-level data security solutions and consulting services

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Absio Broker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Absio
HQ Location
Denver, Colorado
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DigiCert Trust Lifecycle Manager is a converged public and private digital trust solution for CA-agnostic certificate management and PKI services. Trust Lifecycle Manager centralizes visibility and co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DigiCert Trust Lifecycle Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    digicert
    Year Founded
    2003
    HQ Location
    Lehi, UT
    Twitter
    @digicert
    6,703 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,666 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DigiCert Trust Lifecycle Manager is a converged public and private digital trust solution for CA-agnostic certificate management and PKI services. Trust Lifecycle Manager centralizes visibility and co

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
DigiCert Trust Lifecycle Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.6
Ease of Use
Average: 8.8
Seller Details
Seller
digicert
Year Founded
2003
HQ Location
Lehi, UT
Twitter
@digicert
6,703 Twitter followers
LinkedIn® Page
www.linkedin.com
1,666 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DuoKey is a Swiss-based company, headquartered in Prilly, which specialises in advanced encryption and key management solutions. The company offers a comprehensive suite of key management and encryp

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DuoKey Key Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DuoKey
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

DuoKey is a Swiss-based company, headquartered in Prilly, which specialises in advanced encryption and key management solutions. The company offers a comprehensive suite of key management and encryp

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DuoKey Key Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
DuoKey
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. N

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Encryptonizer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Integrations
    1
    Protection
    1
    Cons
    Limited OS Compatibility
    1
    Mobile Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Encryptonizer features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1992
    HQ Location
    Stamford, US
    Twitter
    @NetLibSecurity
    564 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. N

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Encryptonizer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Integrations
1
Protection
1
Cons
Limited OS Compatibility
1
Mobile Limitations
1
Encryptonizer features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
1992
HQ Location
Stamford, US
Twitter
@NetLibSecurity
564 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Entrust Cryptographic Security Platform is an innovative solution that unifies cryptographic management by combining the rich capabilities used to operate public key infrastructure (PKI), certific

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust Cryptographic Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Entrust Cryptographic Security Platform is an innovative solution that unifies cryptographic management by combining the rich capabilities used to operate public key infrastructure (PKI), certific

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Entrust Cryptographic Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,415 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust KeyControl redefines cryptographic key and secrets management by combining key lifecycle management and a decentralized vault-based architecture with a comprehensive central policy and complia

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust KeyControl features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust KeyControl redefines cryptographic key and secrets management by combining key lifecycle management and a decentralized vault-based architecture with a comprehensive central policy and complia

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Entrust KeyControl features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,415 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    If your organization faces the operational risk of certificate-related outages, compliance gaps in PKI governance, or security vulnerabilities from unmanaged machine identities, Evertrust's CLM soluti

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Evertrust Horizon features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Evertrust
    Year Founded
    2017
    HQ Location
    Paris, FR
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

If your organization faces the operational risk of certificate-related outages, compliance gaps in PKI governance, or security vulnerabilities from unmanaged machine identities, Evertrust's CLM soluti

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Evertrust Horizon features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Evertrust
Year Founded
2017
HQ Location
Paris, FR
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fortanix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    3
    Comprehensive Solutions
    1
    Data Protection
    1
    Security
    1
    Cons
    Compatibility Issues
    1
    Data Management
    1
    Inadequate Security
    1
    Insufficient Details
    1
    Limited Visibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortanix features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortanix
    Year Founded
    2016
    HQ Location
    Santa Clara CA
    Twitter
    @fortanix
    1,014 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Fortanix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
3
Comprehensive Solutions
1
Data Protection
1
Security
1
Cons
Compatibility Issues
1
Data Management
1
Inadequate Security
1
Insufficient Details
1
Limited Visibility
1
Fortanix features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.4
Ease of Use
Average: 8.8
Seller Details
Seller
Fortanix
Year Founded
2016
HQ Location
Santa Clara CA
Twitter
@fortanix
1,014 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HyTrust KeyControl simplifies the process of key management for applications that do not require sophisticated policy based key management – but still need to perform to scale to enterprise grade leve

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HyTrust Key Control features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HyTrust
    HQ Location
    Minneapolis, Minnesota, United States
    Twitter
    @HyTrust
    1,601 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HyTrust KeyControl simplifies the process of key management for applications that do not require sophisticated policy based key management – but still need to perform to scale to enterprise grade leve

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
HyTrust Key Control features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
HyTrust
HQ Location
Minneapolis, Minnesota, United States
Twitter
@HyTrust
1,601 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key manage

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Data Encryption features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key manage

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 25% Enterprise
IBM Guardium Data Encryption features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.1
Ease of Use
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Boulder, US
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Boulder, US
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KETS Quantum Key Distribution features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    KETS
    Year Founded
    2016
    HQ Location
    Kingswood, England, United Kingdom
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
KETS Quantum Key Distribution features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
KETS
Year Founded
2016
HQ Location
Kingswood, England, United Kingdom
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KeyNexus is a cloud-based encryption-key storage and provisioning service purpose-built for developers of cloud-based applications.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeyNexus features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    KeyNexus
    Year Founded
    2012
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

KeyNexus is a cloud-based encryption-key storage and provisioning service purpose-built for developers of cloud-based applications.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
KeyNexus features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
KeyNexus
Year Founded
2012
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Complete vendor-independent key management solution.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OASIS Key Management Interoperability Protocol (KMIP) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cryptsoft
    Year Founded
    1996
    HQ Location
    Brisbane, AU
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Complete vendor-independent key management solution.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
OASIS Key Management Interoperability Protocol (KMIP) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cryptsoft
Year Founded
1996
HQ Location
Brisbane, AU
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Accelerate your speed of innovation while ensuring data privacy, security and compliance. As easy as an API. Fast to implement, endlessly customizable, and ready to help you solve the biggest data pri

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PII Data Privacy Vault features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Skyflow
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Accelerate your speed of innovation while ensuring data privacy, security and compliance. As easy as an API. Fast to implement, endlessly customizable, and ready to help you solve the biggest data pri

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
PII Data Privacy Vault features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Skyflow
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringin

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Powertech Encryption for IBM i features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringin

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Powertech Encryption for IBM i features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privakey Cloud uses the OpenID Connect framework and behaves much like a social login, making it easy to enable for websites, online services, and apps.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privakey Cloud features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Privakey
    Year Founded
    2016
    HQ Location
    Philadelphia, US
    Twitter
    @privakey
    223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privakey Cloud uses the OpenID Connect framework and behaves much like a social login, making it easy to enable for websites, online services, and apps.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Privakey Cloud features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Privakey
Year Founded
2016
HQ Location
Philadelphia, US
Twitter
@privakey
223 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RevBits Privileged Access Management is a four-in-one solution that includes privileged account, password, key and certificate management, as well as extensive session logging that captures keystrokes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privileged Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Mineola, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RevBits Privileged Access Management is a four-in-one solution that includes privileged account, password, key and certificate management, as well as extensive session logging that captures keystrokes

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Privileged Access Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Mineola, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Randtronics DPM Key Manager provides centralized key lifecycle management for Randtronics and non Randtronics encryption products.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Randtronics DPM easyKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    North Ryde, AU
    Twitter
    @Randtronics
    82 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Randtronics DPM Key Manager provides centralized key lifecycle management for Randtronics and non Randtronics encryption products.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Randtronics DPM easyKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
North Ryde, AU
Twitter
@Randtronics
82 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sepior provides advanced cryptographic key management and protection software, libraries, SDKs and toolsets. Our customers are typically platform developers, service providers, product providers, or l

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sepior features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sepior
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Sepior provides advanced cryptographic key management and protection software, libraries, SDKs and toolsets. Our customers are typically platform developers, service providers, product providers, or l

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sepior features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sepior
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SSH Universal Key Manager grants, automates and enables single sign-on remote access to the digital core of every Fortune 500 company.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SSH Universal Key Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1995
    HQ Location
    Helsinki, FI
    Twitter
    @SSH
    3,398 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
    Ownership
    HEL: SSH1V
Product Description
How are these determined?Information
This description is provided by the seller.

SSH Universal Key Manager grants, automates and enables single sign-on remote access to the digital core of every Fortune 500 company.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SSH Universal Key Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,398 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
Ownership
HEL: SSH1V
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect your business Tanker helps companies deal with sensitive user data.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tanker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tanker
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protect your business Tanker helps companies deal with sensitive user data.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Tanker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Tanker
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CipherTrust Manager from Thales is the key management solution, allowing businesses to manage encryption keys, define access control, and configure security policies from a single management console.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales CipherTrust Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

CipherTrust Manager from Thales is the key management solution, allowing businesses to manage encryption keys, define access control, and configure security policies from a single management console.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Thales CipherTrust Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,798 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unbound Key Control (UKC) is a unified key manager and virtual HSM which provides full key lifecycle management across on-premise data centers and multiple cloud environments. This pure-software solu

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Unbound CORE for Information Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Unbound Key Control (UKC) is a unified key manager and virtual HSM which provides full key lifecycle management across on-premise data centers and multiple cloud environments. This pure-software solu

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Unbound CORE for Information Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VAULTODY is a custody technology platform that provides a secure MPC wallet infrastructure for seamless and flexible crypto assets management. The platform combines industry-leading protection technol

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vaultody features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Sofia, Bulgaria
    Twitter
    @Vaultody
    32 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

VAULTODY is a custody technology platform that provides a secure MPC wallet infrastructure for seamless and flexible crypto assets management. The platform combines industry-leading protection technol

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Vaultody features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Sofia, Bulgaria
Twitter
@Vaultody
32 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vSEC:CMS C-Series features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
vSEC:CMS C-Series features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PROTECT DATA STORED ON SERVERS AND BACKUP DRIVES WITH ZECURION STORAGE SECURITY

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zecurion Storage Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zecurion
    Year Founded
    2001
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PROTECT DATA STORED ON SERVERS AND BACKUP DRIVES WITH ZECURION STORAGE SECURITY

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Zecurion Storage Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Zecurion
Year Founded
2001
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®

Learn More About Encryption Key Management Software

What is Encryption Key Management Software?

Encryption key management software assists companies with protecting and managing their cryptographic keys used for encrypting data on devices and in applications. Encryption key management software manages encryption keys throughout a key pair’s lifecycle, which includes key generation, exchange, use, integrity, availability, storage, backup or archive, revocation, and deregistration or destruction. On the backend, these tools manage encryption key generation, distribution, and replacement, while on the client side, the tools inject encryption keys and store and manage them on devices. These software solutions protect the keys by ensuring that only authenticated and authorized users can access them, preventing them from being disclosed, lost, misused, or intercepted by unauthorized parties.

What Do KMS and HSM Stand For?

KMS stands for key management systems. Key management systems are centralized hubs that manage the key lifecycle, including generation, certification, storage, usage, expiration, revocation, and retirement. Centralized key management systems work in conjunction with hardware security modules (HSMs). KMS may also be known by the following acronyms: CKMS, which is cryptographic key management system, or EKMS, which stands for enterprise key management system.

HSM stands for hardware security modules. Hardware security modules are servers built to be tamper-resistant or tamper-proof. HSMs generate, retrieve, share, and protect keys. These are considered the most secure key storage as these are physically built to prevent tampering by using special tamper-resistant screws and sealants.

What Types of Encryption Key Management Software Exist?

On-premises encryption key management

Some companies opt to store their key manager on-premises using a hardware security module (HSM), which is a server built to be tamper-resistant or tamper-proof. 


Cloud-based encryption key management

Some companies have complex key management needs and need a solution that scales to meet the volume and complexity of their encryption key transaction needs. Centralized cloud-based encryption key management can assist with symmetric and asymmetric key management and work with various databases, applications, and standards. Bring your own encryption (BYOE) or bring your own key (BYOK) is akin to the bring your own device (BYOD) security models—companies bring their own encryption key management software to deploy on public cloud infrastructure. However, this security model has trade-offs as this may entail giving cloud providers access to keys, which may not meet a company’s security policies. 

Key management as a service

Some cloud providers offer their own key management as a service solution in their cloud environments.

What are the Common Features of Encryption Key Management Software?

The following are some core features within encryption key management software:

Interoperability: For companies that use multiple types of cryptographic keys and multiple software applications, interoperability is important. Many encryption key management solutions are based on standard protocols, including Key Management Interoperability Protocol (KMIP) standard or Public Key Crypto Standard (PKCS 11). Other solutions will rely on closed-source key management.

Policy management: Companies may have specific policies for their encryption keys, including when to expire or revoke them or methods to prevent sharing the keys. Encryption key management software will enforce these policies.

Access management: In addition to creating and managing the keys themselves, it is important to manage who has access permissions to those keys. Many companies employ a least-privilege policy where users and systems have the least access needed to achieve their role function. Encryption key management solutions can enforce those policies, ensuring that only authorized and authenticated users or systems have access to the keys can prevent misuse. These tools will also provide access and audit logs.

Backup: If the keys are lost, access to the encrypted data will be unrecoverable without backup. Many encryption key management solutions offer backup features.

What are the Benefits of Encryption Key Management Software?

If not properly managed, encryption keys can fall into the wrong hands and be used to decrypt sensitive data. This can risk sensitive encrypted data or disrupt critical business information access. Managing encryption keys manually can be challenging to meet today’s business needs as the scale and complexity of applications used and the encryption and keys needed to secure those have grown, which is why many companies have opted for automated management solutions. If data encryption key management is managed manually, this time-consuming task may come at the expense of speed, availability, interoperability, accuracy, and integrity. 

Security: The main purpose of encryption and, therefore, encryption key management is security. Encryption key management software assists in managing encryption keys at scale in a secure manner and remains available to meet business needs.

Meeting regulatory compliance: Some highly regulated industries are bound by various data protection regulations for storing and managing encryption keys. Using encryption key management software, companies can meet requirements of regulations such as PCI DSS 3.2.1, NIST 800-53, and NIST 800-57.

Scalability: Today’s businesses rely on multiple devices and applications needing encryption, meaning they need an encryption key management solution that scales at speed to generate, distribute, and manage the keys. This can mean the ability to generate hundreds of keys per minute. Many businesses require low latency and high availability for their keys.

Who Uses Encryption Key Management Software?

Information security professionals: Information security professionals use encryption key management solutions which may include on-premises solutions like HSMs, centralized cloud-based solutions, or cloud-infrastructure-specific software-as-a-service solutions.

IT professionals: If a company does not have a dedicated information security (infosec) team, the responsibility for managing encryption keys falls on information technology (IT) teams.

Software Related to Encryption Key Management Software

Related solutions that can be used together with or as an alternative encryption key management software include:

Encryption software: Companies use encryption software to protect the confidentiality and integrity of their data. Encryption software will turn plaintext into cipher text using encryption. Keys to unencrypt the data will be stored using encryption key management solutions.

Email encryption software: To protect the confidentiality of data in transit, companies use email encryption software. Companies can use encryption key management solutions to protect the encryption keys. 

Certificate lifecycle management (CLM) software: Public key infrastructure (PKI) is an asymmetric encryption key management system that utilizes digital certificates such as SSL or TLS certificates and public keys to secure assets like website traffic.

Secrets management tools: Developer and DevOps teams, in particular, may utilize secrets management tools to store sensitive digital assets, such as encryption keys.

Challenges with Encryption Key Management Software

BYOE or BYOK: Companies must carefully understand who has access to their encryption keys. When utilizing a BYOE or BYOK security model, it is important to know who has access to the keys, including providers.

Scalability and availability: It is important to ensure that generating, managing, utilizing, and retiring encryption keys meets your company’s scale and availability requirements.

Backup: If encryption keys are lost, companies must have a backup plan. Ensure the software solution you are evaluating meets your specific backup needs.

Regionality: Some geographic areas have data sovereignty and data residency requirements, so encryption keys may be managed differently based on the regional requirements.

Governance: Some data may be governed by data protection regulations, and a company’s encryption and encryption key management policies may need to meet specific regulatory compliance needs.

How to Buy Encryption Key Management Software

Requirements Gathering (RFI/RFP) for Encryption Key Management Software

Gather your company’s specific encryption key management requirements, including if you need to manage your encryption keys on-premises, with a centralized cloud key management offering, or using an infrastructure-specific encryption key management service. It is important to determine what kind of interoperability you require. Also, consider the scale at which you need keys deployed and managed and the availability you seek. Discuss your backup needs. Authentication and access control functionality is also important. And determine which geographic areas your business needs are, and be sure to speak with vendors about these requirements.

Compare Encryption Key Management Software Products

Create a long list

The long list should include a list of providers that meet your basic interoperability, hosting, scale, regionality, and functionality requirements. Companies can identify products by using software review sites like G2.com to review what users of those solutions like and dislike, along with rankings on six satisfaction metrics.

Create a short list

Shorten your long list by identifying must-have functionality. Factors to consider at this stage include integrations, price, and whether the solution meets your regulatory requirements.

Conduct demos

When conducting demos of each potential solution, it is important to ask questions about the user interface, the ease of use, and the skills required to operate the encryption key management solution. The company’s staff should be able to learn the functionality of the tool quickly to receive the fastest return on investment.

Selection of Encryption Key Management Software

Choose a selection team

The selection team should include employees using the encryption key management tool in their daily duties and understand the use case. These would typically be colleagues from information security (Infosec) and information technology (IT) teams. Other parties from leadership and finance should also be included.

Negotiation

Security products such as encryption key management tools help companies manage risk. Knowing the cost of a breach or exposed keys to an organization can help your company understand the value these tools bring to your company. Understand what your budget is with this in mind.  

Final decision

Colleagues who work on defining and managing the company’s data security policies and programs are in the best position to decide which software solution fits the organization’s needs. These professionals will have the most experience with cryptography tools and can best evaluate the products.