Manage and Protect Your Encryption Keys
Why you need secure key management
Widespread adoption of encryption to protect sensitive digital assets has led to a proliferation of crypto keys. Dispersed keys often have no clear ownership or scalable management policy.
Key management for databases
Entrust KeyControl and Entrust nShield® hardware security modules (HSMs) integrate with leading database vendors to deliver enhanced database protection with centralized, automated cryptographic key management, and a root of trust for critical encryption keys.
Key management for data backup and recovery
Entrust KeyControl and Entrust nShield HSMs integrate with leading data backup and recovery solutions to deliver enhanced data protection across on-premises, hybrid, and multi-cloud deployments.
Key management for hyperconverged infrastructure
Entrust KeyControl integrates with leading providers to deliver a scalable, cost-effective, future-proofed alternative to traditional data centers. KeyControl acts as a pre-integrated, always-on universal key management server for your KMIP-compatible virtualized environment.
Key management for storage
Entrust KeyControl integrates with data storage products to automate and simplify the lifecycle of encryption keys, including key creation, storage, distribution, rotation, and revocation.
How do I get started?
Universal Key Management with Entrust DataControl, KeyControl, and nShield® HSMs
Address the key management and compliance needs of enterprise multi-cloud deployments with a robust Entrust nShield® HSM root of trust.
Securely generate and manage keys for all endpoint applications using the Key Management Interoperability Protocol (KMIP).
Protect data and meet compliance requirements via agents running on virtualized endpoints and controlled by a centralized policy engine.
Entrust nShield Connect HSM
Get high assurance, scalable cryptographic key services across networks from FIPS 140-2 and Common Criteria EAL4+ certified appliances.
Entrust nShield as a Service HSM
Get easy, efficient access to cloud-based cryptographic services from dedicated nShield HSMs.
2021 Ponemon Global Encryption Trends Study
Find out how organizations are managing encryption across multiple clouds and how your data security practices compare.