Skip to main content
Image
purple hex pattern

Entrust KeyControl

With Entrust KeyControl, businesses can easily manage encryption keys at scale. Using Federal Information Processing Standards (FIPS) 140-2 certified encryption algorithms, KeyControl simplifies management of encrypted workloads by automating the lifecycle of encryption keys; including key storage, backup, distribution, rotation, and key revocation.

Redefining cryptographic key and secrets management

Traditional key management systems haven’t adapted to the realities and risks organizations with multi-cloud strategies face. Basic access controls, sparse metadata, and storage in one-size-fits-all key vaults should no longer be considered key management. You are not effectively managing your keys and secrets if you are not in control and aware of who creates and uses them. Knowing where your keys are stored can be an essential component for compliance with corporate security policies and/or regulations that differ by location and use case. Open Modern key management for a complex multi-cloud world configuration options

Modern key management for a complex multi-cloud world

Entrust KeyControl is setting a new standard for key and secrets management by combining traditional key lifecycle management and a decentralized vault-based architecture with a comprehensive central policy and compliance management dashboard – the KeyControl Compliance Manager. The platform offers decentralized security with centralized visibility across the enterprise’s cryptographic assets. The powerful combination can help ensure data is protected in compliance with stringent regulatory requirements and keys and secrets can be geolocated and managed to respect data sovereignty mandates. Open KeyControl Compliance Manager: Data protection is in the details configuration options

KeyControl Compliance Manager: Data protection is in the details

The KeyControl Compliance Manager provides a powerful compliance dashboard with granular policy management and control of cryptographic keys and secrets across your enterprise. The unified dashboard allows you to view and monitor your organization’s cryptographic assets in vaults configured locally or geographically distributed.

Entrust KeyControl

Why You Need Secure Key Management

Image
secure data icon

Databases

Entrust KeyControl and Entrust nShield® hardware security modules (HSMs) integrate with leading database vendors to deliver enhanced database protection with centralized, automated cryptographic key management, and a root of trust for critical encryption keys.

faded gray hex background
Image
database icon

Data Backup and Recovery

Entrust KeyControl and Entrust nShield HSMs integrate with leading data backup and recovery solutions to deliver enhanced data protection across on-premises, hybrid, and multi-cloud deployments.

faded gray hex background
Image
layers icon

Hyperconverged Infrastructure

Entrust KeyControl integrates with leading providers to deliver a scalable, cost-effective, future-proofed alternative to traditional data centers. KeyControl acts as a pre-integrated, always-on universal key management server for your KMIP-compatible virtualized environment.

faded gray hex background
Image
layout icon

Storage

Entrust KeyControl integrates with data storage products to automate and simplify the lifecycle of encryption keys, including key creation, storage, distribution, rotation, and revocation.

faded gray hex background
Image
keys icon

BYOK

Bring Your Own Key (BYOK) lets you manage your encryption key lifecycles and keep full ownership and control while using them in the cloud.

faded gray hex background

Request Free Trial of Entrust KeyControl

Sign up for a 30-day free trial of Entrust KeyControl to experience complete control of your encryption key lifecycle in the cloud.

Get your copy of Key Management for Dummies