For virtually every organization today, the adoption of multiple cloud services continues to expand—and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys, and the potential risks. With the CipherTrust Cloud Key Manager, your organization can establish strong controls over encryption keys and policies for data encrypted by cloud services.
CipherTrust Cloud Key Manager supports a growing list of infrastructure-, platform- and software as a service (IaaS, PaaS and SaaS) providers. SaaS solutions include Microsoft Office365, Salesforce.com and Salesforce Sandbox. Supported IaaS/PaaS solutions include Microsoft Azure, Microsoft Azure Germany and China National Clouds, Microsoft Azure Stack, and Amazon Web Services.
Gain Strong Key Control and Security
Data Encryption solutions from leading public cloud providers such as Microsoft Azure, Amazon Web Services and Salesforce.com provide Bring Your Own Key (BYOK) services that enable customers to separate key management from provider-controlled encryption. CipherTrust Cloud Key Manager utilizes BYOK services to deliver key generation, separation of duties, reporting, and key lifecycle management that help fulfill internal and industry data protection mandates, all with FIPS 140-2-certified secure key storage.
Fulfill Best Practices
Separate encryption keys from data encryption and decryption operations for compliance, best security practices and control of your data. Gain operational insights on encryption key usage with dashboards, reports and logs with CipherTrust Cloud Key Manager.
Enjoy Enhanced IT Efficiency
CipherTrust Cloud Key Manager centralizes encryption key management from multiple environments, presenting all supported clouds and even multiple cloud accounts in a single browser tab. Automated key rotation and federated login dramatically simplify key life cycle management.
Strong Encryption Key Security
CipherTrust Cloud Key Manager leverages the security of either the Vormetric Data Security Manager or Thales KeySecure to create keys and securely store them. Keys sourced by the solution are always available to mitigate accidental key deletion in cloud consoles. You control full key metadata control during upload and for keys in use.
True Multi-Cloud Support
With support for Amazon Web Services, Microsoft Azure, Microsoft Azure Stack, Microsoft Azure Germany and China national clouds, IBM Cloud, Salesforce.com and Salesforce Sandbox, CipherTrust Cloud Key Manager keeps you in control of encrypted data across multiple clouds from a single pane of glass, including across multiple accounts.
Automated Key Rotation
With the click of a button or an API request, keys are marked for automated key rotation on a per-cloud schedule. From then on, CipherTrust Cloud Key Manager performs key rotation automatically with comprehensive logging for IT efficiency and enhanced data security. Key Rotation may be specified for keys without expiration dates, or specifically for keys to be rotated prior to their expiration dates.
Comprehensive Key Management
Deploy CipherTrust Cloud Key Manager with any number of keys already created at your cloud provider. It will synchronize its key database with your provider’s. Key attributes such as expiration rules and usage options are all maintained.
Federated User Access to Key Management
Each cloud service login is authenticated and authorized by the service provider - CipherTrust Cloud Key Manager includes no login data base nor requires AD or LDAP integration. Granular key usage authorization ensures that users see only permitted keys.
The Compliance Tools You Need
CipherTrust Cloud Key Manager has the full range of logs and reports you need for fast compliance reporting, including a per-cloud operational logs and a range of pre-packaged key activity reports.
Implementation Choices that Match Your Needs
CipherTrust Cloud Key Manager offers several convenient implementation choices to meet your security and deployment needs:
Supported Cloud Providers:
CipherTrust Cloud Key Manager Deployment Options
Secure Key Generation and Storage Options
Vormetric Transparent Encryption enterprise encryption software delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments.