The IT and telecom sector includes IT solution and service providers, consulting companies, internet service providers, and communication companies. IT and telecom companies are constantly evolving in terms of technology. The development of innovative technologies, such as mobile, cloud, and social media, is driving the IT and telecom market growth. The increasing use of mobile devices has allowed users to access their emails and other files on personal devices. This has increased the need to protect intellectual property and comply with the industry regulations. Telecom companies and IT service providers are deploying enterprise key management solutions to secure business-critical information being accessed on mobile devices. Enterprise key management solutions also facilitate the secure access of critical business data through the cloud. The IT and telecom sector is focused on aligning business strategies with security plans. Companies are conducting data security awareness programs for employees and customers.

Enterprise Key Management Software in IT and Telecom

Comparing 25 vendors in Enterprise Key Management Software across 108 criteria.
All vendors(14)
Filters
Reset
2
3
7
12
7
13
8
11
11
12
14
7
7
13
9
11
12
13
8
11
12
11
14
14
8
Thales-e-Security offers Vormetric data security platform. Thales eSecurity key Management is a combination of varied products such as data security manager, transparent encryption, transparent encryption live data transformation extension, transparent encryption docker extension, a vaultless tokenization with dynamic data masking cloud encryption gateway application encryption key management, key management-as-a-service, security intelligence logs, and protection for Teradata database, which can be deployed individually. Vormetric data security is a highly scalable, efficient data security platform enabling its commercial clientele to address crucial security challenge or compliance requirement. Thales-eSecurity Key Management offers key authority, Vormetric key management, and Vormetric key management-as-a-service for managing enterprise key used to encrypt sensitive data. Thales eSecurity Key Management solution helps to manages keys of integrated vormetric transparent encryption, vormetric application encryption, and third-party encryption solution. Thales’s enterprise key management solution is accomplished with advance features such as simplified key management, reduced downtime, centralized reporting, and supports multitenant operations.
Read less Read more
IBM offers a wide range of products and solutions in security market space. Some of the featured security solutions offered by IBM include security intelligence and analytics, advanced fraud protection, identity and access management, data security and privacy, application security, and infrastructure protection.IBM Security Key Lifecycle Manager platform offers a full range of security capabilities including vulnerability assessment of data, encryption, blocking, alerting, and securing sensitive data to its commercial clients. IBM Security Key Lifecycle Manager offers automated analysis of external and internal risk related to data. The IBM Security solutions develop a holistic secured environment at a low cost with advanced service and easily manageable risks. IBM provides solution for securing data with advanced feature of safeguarding it despite of the location of data. In the enterprise key management market, the company offers IBM security key lifecycle manager formerly known as Tivoli key lifecycle manager. This solution offers centralized, automated process to encrypt data for securing it from attacks. Additionally, it offers secure and robust storage for keys and also helps to maintain lifecycle of IBM and Non-IBM keys by using Key Management Interoperability Protocol (KMIP). IBM key life cycle manager can be seamlessly integrated with the IBM storage, helps to reduce maintenance cost, and offers transparent key management. The solution addresses regulations standards such as PCI-DSS, which supports all the rules related to protection of keys and processes managing those keys.
Read less Read more
3.4
Gemalto offers solutions for data encryption and cloud security. It provides a comprehensive portfolio of cloud service providers and enterprises to secure their enterprise and cloud assets.  Gemalto offers SafeNet virtual keySecure to centrally manage the keys used to encrypt data. Safenet has the advanced feature of scaling key management process to a remote location or cloud infrastructure. SafeNet virtual keySecure supports the keys throughout the lifecycle, for instance, secure key generation, storage and backup of keys, key distribution, deactivation, and deletion of the keys. Safenet has made the management operation easy for its customers by automating tasks such as key expiry and key rotation. In September 2016, it has expanded the SafeNet data protection portfolio to protect big data deployments in the cloud, data center, and virtualized environments.
Read less Read more
3.3
AWS offers AWS key management services to its clients that enabled its customers to create and control encryption keys. Its fully managed service empowers clients to protect data with this service. AWS KMS offers its customers to create, import, rotate, disable, delete, define usage policies, and audit the use of encryption keys used to secure data. In order to simplify the management of encryption keys used to encrypt data, the KMS is integrated with other AWS services including Amazon Elastic Block Store (Amazon EBS), Amazon Simple Storage Service (Amazon S3), Amazon Redshift, Amazon Elastic Transcoder, Amazon WorkMail, and Amazon Relational Database Service (Amazon RDS). The company offers integration of AWS KMS with AWS CloudTrail to provide key usage logs to streamline the auditing, regulatory, and compliance requirements.
Read less Read more
The company offers Oracle Key Manager, a platform to store, protect, and centrally manage encryption keys. Oracle Key Manager helps to accelerate encryption deployment thereby offering the central management of encryption keys, Oracle wallets, java keystores, and credential files. Oracle Key Manager offers a variety of key features including management of key lifecycle, optimization of Transparent Data Encryption (TDE) master keys, provisions to manage endpoints, disaster recovery management, schedules automatic backup to a remote location, and supports standards compliance. Growing amount of sensitive data has increased the concern of enterprises for security and this has led to the adoption of Oracle Key Vault among enterprises.
Read less Read more
CA Technologies offers CA encryption manager a comprehensive solution for automating encryption key management processes such as documentation, storage, and distribution. This advanced solution supports multiple vendor mainframes and various distributed environments including Linux, UNIX, Windows, and Solaris. CA encryption manager is an innovative, flexible solution helping to safeguard data and manage the entire lifecycle of the encryption key. This solution helps its customer base to meet all the business needs by incorporating compliances and regulations related to data. Along with this, the company offers support services to its clientele to safeguard the critical data for its business needs. The solution offers various advantages including protection from vulnerabilities attack, cross-platform support, hardware independence, transparency of management process, and reduces management cost.
Read less Read more
WinMagic offers complete centralized management, bit locker management, removable media encryption, mobile device management, self-encrypting drives, key management, file and folder encryption, and pre-boot authentication under its flagship suite known as SecureDocs to its commercial clientele, enabling companies to gain a competitive edge in the market. The company possesses a significant breadth of offerings in the enterprise key management arena, and its key management solution provides enhanced features and functionalities to its commercial customers. WinMagic provides reliable key management solutions with varied features including fulldisk encryption; file and folder encryption; pre-boot network based authentication; PKI/Tokens and database protection; and helping enterprises to monitor and manage infrastructure, including removable devices, portable media, mobile devices, desktop, and laptops.
Read less Read more
Google has a large volume of keys to maintain the security of data, hence these DEK are encrypted using the Key Encryption Key (KEK). For every cloud platform, there exist one or more KEK. This KEKs need high security to keep it safe from the attack of any kind of security breaches, hence for the purpose, it is stored in the Google Cloud Key Management Service (KMS), a repository offering secured management of keys throughout the key lifecycle.
Read less Read more
Enterprise key management software as the name itself depicts that it is a critical professional management system that is entitled to provide the encryption keys across several OS and databases. The main motto lies in keeping the data safe. The objective of this software lies in creating, managing as well as distributing the 192-bit, 128-bit as well as 256-bits AES keys for any database or applications irrespective of the company’s OS.
Read less Read more
2.4
Egnyte is a privately-held company. It provides an efficient workflow for businesses by introducing secure file sharing, content governance, and infrastructure modernization solutions. Egnyte’s solutions enable the user to share business files securely on-premises and in the cloud with simple management policies and seamless app integration. It makes the data easy to access and provides speed file change synchronization. Accompanied with secured access and control, Egnyte’s solutions also reduce internal threats to data stored in different repositories.
Read less Read more
Virtucrypt is a highly acclaimed organization worldwide. It is a leading provider of Enterprise Key Management services. The Virtucrypt Enterprise Key Management Solutions are highly reliable for managing secure encryption, distribution, storage and certification of critical information. The Virtucrypt provides innovative hardware-based enterprise cloud security solutions. The Virtucrypt EKMS are widely trusted due to their reliable services and security management. Their security technology is ideal for handling large volume keys and ciphered objects.
Read less Read more
CipherCloud is the leading provider of cloud security solutions. The CipherCloud award-winning Enterprise Key Management software provides robust end-to-end data protection. Prior to sending data into the cloud, the CipherCloud platform conducts real-time data encryption using searchable secure encryption. The innovative technology features used in CipherCloud Enterprise Key Management facilitate enhanced security while mitigating risks. The software also provides an insight into the user’s activity in the cloud environment.
Read less Read more