KeyControl

Simplify Encryption Management with KeyControl​​

Central Management for Encryption and Key Management Policies​​

HyTrust KeyControl can be easily deployed on physical or virtual servers. In tandem with the HyTrust DataControl encryption engine, KeyControl provides automated, centrally managed control over all encryption and key management policies.

KeyControl Capabilities

  • Policy-Based Key Management
    Administrators do not need to be security experts. Key management is easily automated from a web browser or through APIs, and keys are managed through policy settings, making the system easy to use.
  • Multi-Tenant
    KeyControl is fully multi-tenant, and is able to support keys for many customers or departments, supporting separation of duties and shared, secure administration.
  • Granularity
    Encryption keys can be applied per device within a VM, for standard data partitions and for Windows boot and Linux root and swap partitions, as well as objects such as files that can be moved securely between VMs or between the data center and cloud-based storage such as Amazon S3 storage.
  • Online Rekeying
    Administrators can set policies to re-key data in accordance with industry regulations like PCI or with company guidelines. This is especially significant for organizations with lots of data and many encryption keys, and for companies that must meet SLAs for application uptime.
  • High-Availability
    HyTrust KeyControl can be deployed in distributed clusters for failover and high-availability. In the event one server is unavailable, key data will automatically be provided from other cluster members.

Data Sheets

HyTrust DataControl Data Sheet

HyTrust DataControl helps organizations lock down virtual machines and their data so they remain secure throughout their lifecycle, from creation until they are securely decommissioned, easily and automatically.

Download

White Papers

Top 10 Encryption Myths

Thanks to history, encryption has gotten a bit of a bad reputation. Hard to deploy. Slow. Key management is too complicated. The good news is that today’s encryption technologies have come light years from their ancestors. Download this paper and join us in debunking 10 myths about data encryption.

Learn More

White Papers

Top 10 Reasons You Need Encryption

In this paper, we explore 10 of the common benefits of encryption and show you how HyTrust DataControl uniquely removes the barriers to adopting an encryption solution.

Download

Solution Briefs

Enhancing VDI with HyTrust DataControl

HyTrust can help organizations harden their VDI deployments with centrally managed virtualized encryption and key management. With powerful automation and scripting capabilities, HyTrust makes key rotation and other formerly time consuming tasks fast and easy.

Download