Enterprise key management is a system that empowers clients with professional key management solutions, which offer encryption keys across a variety of databases and operating systems. Enterprise key management solutions offer fast, reliable, secure, and easy-to-use hosting services for protection of users’ keys. Additionally, enterprise key management solutions enable clients to efficiently store, backup, protect, and organize encryption keys.

COMPETITIVE LEADERSHIP MAPPING TERMINOLOGY

The MicroQuadrant highlights the top vendors in the enterprise key management market. The MicroQuadrant provides information about the major players, who offer enterprise key management solutions and services, and outlines the findings and analysis on how well each market vendor performs within our criteria. The vendor evaluations are based on 2 broad categories: product offerings and business strategies. Each category carries various criteria, based on which, the vendors are evaluated. The evaluation criteria considered under product offerings includes the breadth of offerings, delivery (based on industries that the vendors cater to, deployment models, and subscriptions), and support (based on pre and post-sales support services). The evaluation criteria considered under business strategies includes the reach (on the basis of geographic presence), industry coverage (on the basis of end-users that the vendors cater to), and inorganic growth (on the basis of partnerships, collaborations, and acquisitions).

VISIONARY LEADERS

Amazon Web Services, Inc., Gemalto N.V, Hewlett Packard Enterprise Company, IBM Corporation, Oracle Corporation, RSA Information Security LLC, Subsidiary of DELL EMC, Thales e-Security, Inc., and Venafi, Inc. are the leading players in the enterprise key management solutions and services segments and have been recognized as vanguards. They have a strong portfolio of enterprise key management solutions or platform and associated services. These vendors have marked their presence by offering solutions and services that are required by most organizations. 

INNOVATORS

CipherCloud, VirtuCrypt, WinMagic, Egnyte, Inc., and Zettaset, Inc. have been recognized as innovators. They have a wide portfolio of enterprise key management solutions and services, and a strong potential to build strong business strategies for their business growth to be at par with the vanguards. These vendors have been providing enterprise key management offerings as per their customer’s demands. These innovators have been at the forefront in deploying their solutions for niche and custom requests made by their clients.

DYNAMIC DIFFERENTIATORS

Box, Inc., CA Technologies, Google, Inc, Huawei Technologies Co., Ltd., Quantum Corporation, and Townsend Security have been categorized under the dynamic players. They have strong business strategies with extensive channel network and reach. Over the years, these dynamic players have been consistently generating a positive revenue growth in the enterprise key management market with their given set of product offerings. Their market positions have been enhanced by organic and inorganic strategies over the period.

EMERGING COMPANIES

Dyadic Security, Hytrust Inc., Datalocker Inc., Eruces, Inc., Linoma Software, and Pkware, Inc. have been recognized as emerging players in the enterprise key management market. The emerging players are specialized in offering highly niche and tailor-made solutions and services to their clients.

  • Thales-e-Security offers Vormetric data security platform. Thales eSecurity key Management is a combination of varied products such as data security manager, transparent encryption, transparent encryption live data transformation extension, transparent encryption docker extension, a vaultless tokenization with dynamic data masking cloud encryption gateway application encryption key management, key management-as-a-service, security intelligence logs, and protection for Teradata database, which can be deployed individually. Vormetric data security is a highly scalable, efficient data security platform enabling its commercial clientele to address crucial security challenge or compliance requirement. Thales-eSecurity Key Management offers key authority, Vormetric key management, and Vormetric key management-as-a-service for managing enterprise key used to encrypt sensitive data. Thales eSecurity Key Management solution helps to manages keys of integrated vormetric transparent encryption, vormetric application encryption, and third-party encryption solution. Thales’s enterprise key management solution is accomplished with advance features such as simplified key management, reduced downtime, centralized reporting, and supports multitenant operations.

    Read More
    • Enterprise
    • La Defense, France
    • Founded: 2000
    • $1BN to $5BN
    • 50,001 to 75,000
    • Enterprise
    • California, USA
    • Founded: 2015
    • $10BN to $50BN
    • 1,00,001 to 5,00,000
    • Enterprise
    • Texas, USA
    • Founded: 1984
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • IBM offers a wide range of products and solutions in security market space. Some of the featured security solutions offered by IBM include security intelligence and analytics, advanced fraud protection, identity and access management, data security and privacy, application security, and infrastructure protection.IBM Security Key Lifecycle Manager platform offers a full range of security capabilities including vulnerability assessment of data, encryption, blocking, alerting, and securing sensitive data to its commercial clients. IBM Security Key Lifecycle Manager offers automated analysis of external and internal risk related to data. The IBM Security solutions develop a holistic secured environment at a low cost with advanced service and easily manageable risks. IBM provides solution for securing data with advanced feature of safeguarding it despite of the location of data. In the enterprise key management market, the company offers IBM security key lifecycle manager formerly known as Tivoli key lifecycle manager. This solution offers centralized, automated process to encrypt data for securing it from attacks. Additionally, it offers secure and robust storage for keys and also helps to maintain lifecycle of IBM and Non-IBM keys by using Key Management Interoperability Protocol (KMIP). IBM key life cycle manager can be seamlessly integrated with the IBM storage, helps to reduce maintenance cost, and offers transparent key management. The solution addresses regulations standards such as PCI-DSS, which supports all the rules related to protection of keys and processes managing those keys.

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Gemalto offers solutions for data encryption and cloud security. It provides a comprehensive portfolio of cloud service providers and enterprises to secure their enterprise and cloud assets.  Gemalto offers SafeNet virtual keySecure to centrally manage the keys used to encrypt data. Safenet has the advanced feature of scaling key management process to a remote location or cloud infrastructure. SafeNet virtual keySecure supports the keys throughout the lifecycle, for instance, secure key generation, storage and backup of keys, key distribution, deactivation, and deletion of the keys. Safenet has made the management operation easy for its customers by automating tasks such as key expiry and key rotation. In September 2016, it has expanded the SafeNet data protection portfolio to protect big data deployments in the cloud, data center, and virtualized environments.

    Read More
    • SME
    • Amsterdam, Netherlands
    • Founded: 2006
    • $1BN to $5BN
    • 10,001 to 15,000
  • AWS offers AWS key management services to its clients that enabled its customers to create and control encryption keys. Its fully managed service empowers clients to protect data with this service. AWS KMS offers its customers to create, import, rotate, disable, delete, define usage policies, and audit the use of encryption keys used to secure data. In order to simplify the management of encryption keys used to encrypt data, the KMS is integrated with other AWS services including Amazon Elastic Block Store (Amazon EBS), Amazon Simple Storage Service (Amazon S3), Amazon Redshift, Amazon Elastic Transcoder, Amazon WorkMail, and Amazon Relational Database Service (Amazon RDS). The company offers integration of AWS KMS with AWS CloudTrail to provide key usage logs to streamline the auditing, regulatory, and compliance requirements.

    Read More
    • Enterprise
    • Washington, USA
    • Founded: 1994
    • More than $100 BN
    • 5,00,001 & more
  • The company offers Oracle Key Manager, a platform to store, protect, and centrally manage encryption keys. Oracle Key Manager helps to accelerate encryption deployment thereby offering the central management of encryption keys, Oracle wallets, java keystores, and credential files. Oracle Key Manager offers a variety of key features including management of key lifecycle, optimization of Transparent Data Encryption (TDE) master keys, provisions to manage endpoints, disaster recovery management, schedules automatic backup to a remote location, and supports standards compliance. Growing amount of sensitive data has increased the concern of enterprises for security and this has led to the adoption of Oracle Key Vault among enterprises.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1977
    • $10BN to $50BN
    • 1,00,001 to 5,00,000
  • Venafi offers Venafi Trust Protection Platform to secure the business from vulnerabilities affecting data. This platform offers advanced technology to secure keys and certificates from unauthorized access done to steal the data. Venafi Trust Protection Platform helps to secure SSL/TLS, SSH and mobility keys, and certificates. It also offers open APIs and drivers with the help of which it can be easily integrated with any application or network device within any enterprise or over the cloud. This platform is deployed by a number of enterprises as it has advanced feature of supporting regulation standards including PCI-DSS, GLBA, SOX, and HIPAA, by applying secure key management processes, strict separation of duties, and dual control policies. The solution also offers several advantages to clients, such as recovery from security attack, reducing organization risk, streamlining audit process, and automating protection process efficiently across enterprises.

    Read More
    • Startup
    • Salt Lake City, Utah, US
    • Founded: 2000
    • Below $10 MN
    • 101 to 500
  • Box Inc. is a center that provides file sharing and cloud content management services for businesses. They also offer collaborating tools so that the user can determine how the contents are uploaded to servers. They provide one of the best enterprise key management software. Besides, keys are simple to set here and also very cost-effective. A user can have a total liability of control on his/ her content in their cloud. So Box Inc. is a well-acknowledged content management company.

    Read More
    • SME
    • 1,001 to 5,000
  • CA Technologies offers CA encryption manager a comprehensive solution for automating encryption key management processes such as documentation, storage, and distribution. This advanced solution supports multiple vendor mainframes and various distributed environments including Linux, UNIX, Windows, and Solaris. CA encryption manager is an innovative, flexible solution helping to safeguard data and manage the entire lifecycle of the encryption key. This solution helps its customer base to meet all the business needs by incorporating compliances and regulations related to data. Along with this, the company offers support services to its clientele to safeguard the critical data for its business needs. The solution offers various advantages including protection from vulnerabilities attack, cross-platform support, hardware independence, transparency of management process, and reduces management cost.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1961
    • $10BN to $50BN
    • 10,001 to 15,000
  • WinMagic offers complete centralized management, bit locker management, removable media encryption, mobile device management, self-encrypting drives, key management, file and folder encryption, and pre-boot authentication under its flagship suite known as SecureDocs to its commercial clientele, enabling companies to gain a competitive edge in the market. The company possesses a significant breadth of offerings in the enterprise key management arena, and its key management solution provides enhanced features and functionalities to its commercial customers. WinMagic provides reliable key management solutions with varied features including fulldisk encryption; file and folder encryption; pre-boot network based authentication; PKI/Tokens and database protection; and helping enterprises to monitor and manage infrastructure, including removable devices, portable media, mobile devices, desktop, and laptops.

    Read More
    • Enterprise
    • Guangdong, China
    • Founded: 1987
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • WinMagic is a Canadian company that provides easy-to-use and compliant data security solutions globally. The company’s products and solutions include enterprise key management, comprehensive full disk encryption, file sharing encryption, mobile and removable device encryption, server encryption, endpoint encryption, and more.

    The company offers an intelligent unit console–SecureDoc–offers critical management solution for multiple OS (such as Windows, Mac, Linux, and Android) and serving various industries, including healthcare, education, manufacturing, government, retail, legal and financial services. SecureDoc prioritizes cryptography and endpoint security to prevent attackers and unauthorized access.

    Read More
    • Enterprise
    • Ontario, Canada
    • Founded: 1997
    • $11MN to $50MN
    • 101 to 500
  • Google has a large volume of keys to maintain the security of data, hence these DEK are encrypted using the Key Encryption Key (KEK). For every cloud platform, there exist one or more KEK. This KEKs need high security to keep it safe from the attack of any kind of security breaches, hence for the purpose, it is stored in the Google Cloud Key Management Service (KMS), a repository offering secured management of keys throughout the key lifecycle.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1998
    • More than $100 BN
    • 75,001 to 1,00,000
    • Enterprise
    • 501 to 1,000
    • Startup
    • Olympia, Washington, US
    • Founded: 1978
    • Below $10 MN
    • 51 to 100
  • Egnyte is a privately held company headquartered in California, USA. It provides an efficient workflow for businesses by introducing secure file sharing, content governance, and infrastructure modernization solutions.

    Egnyte’s solutions enable the user to share business files securely on-premises and in the cloud with simple management policies and seamless app integration. It makes the data easy to access and provides speed file change synchronization. Accompanied with secured access and control, Egnyte’s solutions also reduce internal threats to data stored in different repositories.

    Read More
    • SME
    • Mountain View, California, US
    • Founded: 2007
    • $51MN to $100MN
    • 101 to 500
    • Enterprise
    • 501 to 1,000
  • Founded in the year 2010, CipherCloud is the leading provider of cloud security solutions. The CipherCloud award-winning Enterprise Key Management software provides robust end-to-end data protection. Prior to sending data into the cloud, the CipherCloud platform conducts real-time data encryption using searchable secure encryption. The innovative technology features used in CipherCloud Enterprise Key Management facilitate enhanced security while mitigating risks. The software also provides an insight into the user’s activity in the cloud environment.

    Read More
    • Enterprise
    • 501 to 1,000
  • HyTrust is an American company that was founded in the year 2007. It has its headquarters in Mountain View, California. The organization offers services and software for compliance, security, and IT infrastructure. With the aid of compliance software, the data transfer to the Cloud is faster. It is rightly said as the multi-Cloud Workload security. Cloud protection standards are very high, and the technology used by the company is up-to-date.

    Read More
    • Enterprise
    • 501 to 1,000
  • Zettaset provides enterprise-level programs that offer software-oriented solutions from data theft across all physical and virtual environments. Zettaset offers data encryption that prevents the breach of sensitive information with zero impact on business performance. It deals with various industries, including financial services, healthcare, and retail.

    The company offers different products for different needs of data security. Zettaset’s product XCrypt Full Disk–offers full disk encryption; XCrypt Archive–provides cloud and device backup protection; XCrypt Object–protects object data stores; XCrypt Service Encryption for CF–serves security for a native cloud environment.

    Read More
    • Startup
    • California, USA
    • Founded: 2009
    • Below $10 MN
    • 51 to 100
  • PKWARE is a US-based software solution company that provides data encryption and data compression software to enterprises operating or associated with financial services, banking, healthcare, and government agencies.

    The creator of.ZIP format also introduced a data protection solution known as Smartcrypt, which is a solution to data discovery and encryption key management. Along with serving its data encryption solutions, the company continues to expand its.ZIP file format standard by introducing ZIP Reader–a ZIP file reader, PKZIP–reduces the file size or used to decompress files, and SecureZIP–compress and encrypt files, emails, and attachments.

    Read More
    • Enterprise
    • Wisconsin, USA
    • Founded: 1986
    • 101 to 500
    • Enterprise
    • 501 to 1,000
    • Startup
    • Overland Park, Kansas, US
    • Founded: 1999
    • Below $10 MN
    • 51 to 100
    • Enterprise
    • 501 to 1,000
  • Dyadic Security offers vHSM, a software security module which can be embedded with a varied range of platform and device. The company’s software is used to manage different application including document signing, SSL certificate, code signing, app-level encryption, database encryption, authentication, certificate authority, PKI infrastructure, and VPN gateways. Dyadic Security offers innovative technology to its customers which remove the single point of failure of security. This is achieved by sharing cryptographic keys over 2 or more servers and carrying out the cryptographic operation without ever recombining them. Dyadic’s clients using software enjoys the benefit of key management irrespective of the location and deployment model as it supports the process of management for every key, site, and cloud.

    Read More
    • Enterprise
    • New York, US
    • Founded: 2013

Enterprise Key Management Software Quadrant

Comparing 25 vendors in Enterprise Key Management Software across 108 criteria.

Find the best Enterprise Key Management Software solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Enterprise Key Management Software tools.
  • Breadth and Depth of Product Offerings
    • Products Offered
    • services
      • Professional Services
      • Managed Services
  • Product Features and Functionality
    • Solutions Offered
      • Mobile
      • Laptop
      • Pad
      • Other devices supported by the solution
    • Applications Served
      • Disk Encryption
      • File/Folder Enryption
      • Database Encryption
      • Communication Encryption
      • Cloud Encryption
  • Delivery
    • End Users
      • BFSI
      • Healthcare
      • Retail
      • Government
      • IT & Telecom
      • Aerospace & Defence
      • Energy And Utilities
      • Manufacturing
      • Others
    • Deployment Model
      • On-Premise
      • Hosted
    • Delivery Models
      • Directly
      • Through Partners / Third-Party Vendors
  • Scalability
    • End Users/Workstations
    • Organization Size
      • SMEs
      • Large Enterprises
  • Support and Services
    • Level of Support Services
    • Support and Services
      • Technical Support
      • Customer Support
      • Sales support
      • Others, please specify
    • Pre Sales Support
      • Software Requirement Specification (SRS)
      • Product Demos
      • Proof of Concept
      • Dedicated Account Manager (DAM)
    • Channel for Delivery of Support Services
      • On-Site Support
      • Remote Support

TOP REVIEWS

Looking for Enterprise Key Management Software? Get help
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#19 in Enterprise Key Management Software

“Protects Virtual Infrastructure"

(*)(*)(*)(*)(*)5
HyTrust offers VMware virtual infrastructure protection with admin capabilities, policy, forensic controls, and secure access.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#19 in Enterprise Key Management Software

“Easy to Deploy"

(*)(*)(*)(*)(*)5
In a year, HyTrust solutions didn’t disappoint us with its security features to prevent theft. It is easy to deploy its data control policies and prevent VMs from being copied without credentials.
Global Head - Service and Product Development,Company Name Classified
Global Head - Service and Product Development, Company Name Classified
#18 in Enterprise Key Management Software

“Stable Value Delivery"

(*)(*)(*)(*)(*)5
We are using CipherCloud for two years, and we have seen some valuable improvements in their value delivery system in this period. The solutions are capable of delivering trusted data encryption and cloud security.
Global Head - Service and Product Development,Company Name Classified
Global Head - Service and Product Development, Company Name Classified
#16 in Enterprise Key Management Software

“Pricey but Excellent Security"

(*)(*)(*)(*)(*)5
Egnyte is an excellent solution for secure file sharing. If any business does not want the most significant cloud storage amount and looking for a solution that can be purposeful and could integrate with the apps they use every day, Egnyte is the right choice.
Project Manager,Company Name Classified
Project Manager, Company Name Classified
#18 in Enterprise Key Management Software

“Appreciable third-party app Integration"

(*)(*)(*)(*)(*)5
Our organization is using CipherCloud’s security solution for more than a year, and we are impressed with its features of their third-party app integration. Its trusted cloud security is also reliable.
...

Marie Stelle

Engagement Partner - 360Quadrants.com