The aerospace and defense vertical engages the exponential use of advanced technologies, virtualized infrastructures, private cloud services, and mobile applications. The vertical handles the private data of individuals, departments, processes, and agencies. Additionally, it deals with highly classified sensitive information. Firms operating in the aerospace and defense vertical work on critical information, intelligence reports, and other confidential data. Irrespective of their location, employees access highly-confidential information on their mobile devices. Therefore, it is necessary to secure this sensitive data from theft and unauthorized access. Enterprise key management solutions ensure the security of cryptographic keys to prevent cyber-attacks and eliminate data loss threats.

Enterprise Key Management Software in Aerospace and Defense Quadrant

Comparing 25 vendors in Enterprise Key Management Software across 190 criteria.

Find the best Enterprise Key Management Software solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Enterprise Key Management Software tools.
  • Breadth and Depth of Product Offerings
    • Products Offered
    • services
      • Professional Services
      • Managed Services
  • Product Features and Functionality
    • Solutions Offered
      • Mobile
      • Laptop
      • Pad
      • Other devices supported by the solution
    • Applications Served
      • Disk Encryption
      • File/Folder Enryption
      • Database Encryption
      • Communication Encryption
      • Cloud Encryption
  • Delivery
    • End Users
      • BFSI
      • Healthcare
      • Retail
      • Government
      • IT & Telecom
      • Aerospace & Defence
      • Energy And Utilities
      • Manufacturing
      • Others
    • Deployment Model
      • On-Premise
      • Hosted
    • Delivery Models
      • Directly
      • Through Partners / Third-Party Vendors
  • Scalability
    • End Users/Workstations
    • Organization Size
      • SMEs
      • Large Enterprises
  • Support and Services
    • Level of Support Services
    • Support and Services
      • Technical Support
      • Customer Support
      • Sales support
      • Others, please specify
    • Pre Sales Support
      • Software Requirement Specification (SRS)
      • Product Demos
      • Proof of Concept
      • Dedicated Account Manager (DAM)
    • Channel for Delivery of Support Services
      • On-Site Support
      • Remote Support

TOP VENDORS

  • #

    AWS offers AWS key management services to its clients that enabled its customers to create and control encryption keys. Its fully managed service empowers clients to protect data with this service. AWS KMS offers its customers to create, import, rotate, disable, delete, define usage policies, and audit the use of encryption keys used to secure data. In order to simplify the management of encryption keys used to encrypt data, the KMS is integrated with other AWS services including Amazon Elastic Block Store (Amazon EBS), Amazon Simple Storage Service (Amazon S3), Amazon Redshift, Amazon Elastic Transcoder, Amazon WorkMail, and Amazon Relational Database Service (Amazon RDS). The company offers integration of AWS KMS with AWS CloudTrail to provide key usage logs to streamline the auditing, regulatory, and compliance requirements.

    Read More
    • Enterprise
    • Washington, USA
    • Founded: 1994
    • More than $100 BN
    • 5,00,001 & more
    • Enterprise
    • Texas, USA
    • Founded: 1984
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • #

    Google has a large volume of keys to maintain the security of data, hence these DEK are encrypted using the Key Encryption Key (KEK). For every cloud platform, there exist one or more KEK. This KEKs need high security to keep it safe from the attack of any kind of security breaches, hence for the purpose, it is stored in the Google Key Management Service (KMS), a repository offering secured management of keys throughout the key lifecycle. Google offers cloud KMS in encryption key manager space. This service helps to secure sensitive data in a cloud platform. This service is integrated with IAM and cloud audit logging to manage the administration of the access of encryption key. Cloud KMS helps to implement best security practices over the cloud. It is available to its customers on a price per use model, under which the company offers key versions at a flat rate and charges standard usage rate for key operation.

    Read More
    • Enterprise
    • California, US
    • Founded: 1998
    • More than $100 BN
    • 75,001 to 1,00,000
    • Enterprise
    • Palo Alto, California, United States
    • Founded: 2015
    • 10,001 to 15,000
  • #

    IBM offers a wide range of products and solutions in security market space. Some of the featured security solutions offered by IBM include security intelligence and analytics, advanced fraud protection, identity and access management, data security and privacy, application security, and infrastructure protection. IBM Security Guardium platform offers a full range of security capabilities including vulnerability assessment of data, encryption, blocking, alerting, and securing sensitive data to its commercial clients. This security platform offers automated analysis of external and internal risk related to data. The IBM Security solutions develop a holistic secured environment at a low cost with advanced service and easily manageable risks. IBM provides solution for securing data with advanced feature of safeguarding it despite of the location of data. In the enterprise key management market, the company offers IBM security key lifecycle manager formerly known as Tivoli key lifecycle manager. This solution offers centralized, automated process to encrypt data for securing it from attacks. Additionally, it offers secure and robust storage for keys and also helps to maintain lifecycle of IBM and Non-IBM keys by using Key Management Interoperability Protocol (KMIP). IBM key life cycle manager can be seamlessly integrated with the IBM storage, helps to reduce maintenance cost, and offers transparent key management. The solution addresses regulations standards such as PCI-DSS, which supports all the rules related to protection of keys and processes managing those keys.

    Read More
    • Enterprise
    • 1 to 50
  • #

    The company offers Oracle Key Vault, a platform to store, protect, and centrally manage encryption Keys. This solution helps to accelerate encryption deployment thereby offering the central management of encryption keys, Oracle wallets, java keystores, and credential files. Oracle Key Vault offers a variety of key features including management of key lifecycle, optimization of Transparent Data Encryption (TDE) master keys, provisions to manage endpoints, disaster recovery management, schedules automatic backup to a remote location, and supports standards compliance. Growing amount of sensitive data has increased the concern of enterprises for security and this has led to the adoption of Oracle Key Vault among enterprises.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1977
    • $10BN to $50BN
    • 1,00,001 to 5,00,000
  • #

    Thales-e-Security offers Vormetric data security platform. This security platform is a combination of varied products such as data security manager, transparent encryption, transparent encryption live data transformation extension, transparent encryption docker extension, vaultless tokenization with dynamic data masking cloud encryption gateway application encryption key management, key management-as-a-service, security intelligence logs, and protection for Teradata database, which can be deployed individually. Vormetric data security is a highly scalable, efficient data security platform enabling its commercial clientele to address crucial security challenge or compliance requirement. Thales-e-security offers key authority, Vormetric key management, and Vormetric key management-as-a-service for managing enterprise key used to encrypt sensitive data. Its key management solution helps to manages keys of integrated vormetric transparent encryption, vormetric application encryption, and third-party encryption solution. Thales’s enterprise key management solution is accomplished with advance features such as simplified key management, reduced downtime, centralized reporting, and supports multitenant operations.

    Read More
    • Enterprise
    • La Defense, France
    • $1BN to $5BN
    • 50,001 to 75,000
    • Startup
    • Olympia, Washington, US
    • Founded: 1978
    • Below $10 MN
    • 51 to 100

TOP REVIEWS

Looking for Enterprise Key Management Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.