Skip to main content
hands holding part of server

Control and manage the encryption keys used to protect your backup and recovery data

In the face of the persistent threat of ransomware and other types of attacks, organizations seek cyber resilience for their multi-cloud, hybrid, and on-premises environments. In the event of a disruption, rapid operational recovery is essential to avoiding issues that can quickly propagate across the organization. Enterprises use backup and recovery solutions to capture point-in-time copies of workloads to defend against data loss and expedite the restoration of normal operations. The keys underpinning any encrypted workloads must be stored securely and separately from the data, rotated regularly, and managed at scale.

person standing at desk and typing on keyboard in front of monitor

Encryption key management for backup and recovery

Entrust KeyControl integrates with backup and recovery products to automate and simplify the lifecycle of encryption keys, including key creation, storage, distribution, rotation, and revocation. Using the key management interoperability protocol (KMIP), KeyControl serves as a key management server for a growing list of data protection solutions and can scale to support thousands of encrypted workloads in large deployments. KeyControl delivers FIPS 140-2 Level 1 compliant encryption as standard, with the optional addition of an Entrust nShield HSM for FIPS 140-2 Level 3 generation and protection of your keys for high assurance use cases.

Integration Resources

Request a demo today

An Entrust data protection specialist will be in touch with options soon.
Get Entrust KeyControl for KMIP-compatible workloads free for 30 days.
Close
×

👋 Hello, if you have any
questions, I'm ready to chat.

Chat Now