Skip to main content
purple hex pattern

Entrust KeyControl

With Entrust KeyControl, businesses can easily manage encryption keys at scale. Using Federal Information Processing Standards (FIPS) 140-2 certified encryption algorithms, KeyControl simplifies management of encrypted workloads by automating the lifecycle of encryption keys; including key storage, backup, distribution, rotation, and key revocation.

Redefining cryptographic key and secrets management

Traditional key management systems haven’t adapted to the realities and risks organizations with multi-cloud strategies face. Basic access controls, sparse metadata, and storage in one-size-fits-all key vaults should no longer be considered key management. You are not effectively managing your keys and secrets if you are not in control and aware of who creates and uses them. Knowing where your keys are stored can be an essential component for compliance with corporate security policies and/or regulations that differ by location and use case. Open Modern key management for a complex multi-cloud world configuration options

Modern key management for a complex multi-cloud world

Entrust KeyControl is setting a new standard for key and secrets management by combining traditional key lifecycle management and a decentralized vault-based architecture with a comprehensive central policy and compliance management dashboard – the KeyControl Compliance Manager. The platform offers decentralized security with centralized visibility across the enterprise’s cryptographic assets. The powerful combination can help ensure data is protected in compliance with stringent regulatory requirements and keys and secrets can be geolocated and managed to respect data sovereignty mandates. Open KeyControl Compliance Manager: Data protection is in the details configuration options

KeyControl Compliance Manager: Data protection is in the details

The KeyControl Compliance Manager provides a powerful compliance dashboard with granular policy management and control of cryptographic keys and secrets across your enterprise. The unified dashboard allows you to view and monitor your organization’s cryptographic assets in vaults configured locally or geographically distributed.

Understanding Keys and Secrets Management

What is Secrets Management?

Learn the ins and outs of secrets management, why it’s essential to your business, and best practices you can use to safeguard your assets from unauthorized access.

faded gray hex background

What is Encryption Key Management?

Learn all you need to know about encryption key management, including what it is, why it’s important, and how you can improve your cryptographic ecosystem today.

faded gray hex background
Entrust KeyControl

Why You Need Secure Key Management

secure data icon


Entrust KeyControl and Entrust nShield® hardware security modules (HSMs) integrate with leading database vendors to deliver enhanced database protection with centralized, automated cryptographic key management, and a root of trust for critical encryption keys.

faded gray hex background
database icon

Data Backup and Recovery

Entrust KeyControl and Entrust nShield HSMs integrate with leading data backup and recovery solutions to deliver enhanced data protection across on-premises, hybrid, and multi-cloud deployments.

faded gray hex background
layers icon

Hyperconverged Infrastructure

Entrust KeyControl integrates with leading providers to deliver a scalable, cost-effective, future-proofed alternative to traditional data centers. KeyControl acts as a pre-integrated, always-on universal key management server for your KMIP-compatible virtualized environment.

faded gray hex background
layout icon


Entrust KeyControl integrates with data storage products to automate and simplify the lifecycle of encryption keys, including key creation, storage, distribution, rotation, and revocation.

faded gray hex background
keys icon


Bring Your Own Key (BYOK) lets you manage your encryption key lifecycles and keep full ownership and control while using them in the cloud.

faded gray hex background

Technology Integrations

Request Free Trial of Entrust KeyControl

Sign up for a 30-day free trial of Entrust KeyControl to experience complete control of your encryption key lifecycle in the cloud.

Get your copy of Key Management for Dummies