Entrust KeyControl
Scalable, cost-effective enterprise ready key management system that supports a wide range of use cases.
Manage cryptographic keys and secrets with decentralized vaults and a comprehensive compliance management dashboard.
Redefining Cryptographic Key and Secrets Management
Unified dashboard for fine-grained visibility of keys and secrets
Detailed metrics to identify level of compliance and alert on prohibited key usage
Decentralized vault-based architecture
Can be deployed on-premise with KeyControl
As a Service deployments enabled by KeyControl as a Service in the United States and European markets
Compliance and risk management, its never been so easy
Are you securing the keys and secrets your organization relies on to protect sensitive data and applications? Does your key management solution give you risk reporting, risk scoring, and compliance management at your fingertips? Learn how KeyControl can deliver real business value in your organization, reducing the compliance burden while streamlining your operations.
Try KeyControl for Free
Sign up for a 30-day free trial of Entrust KeyControl to experience complete control of your encryption key lifecycle in the cloud.
Controlling your keys means managing your risks
The KeyControl Compliance Manager policy engine provides fine-grained control of your cryptographic keys and secrets, offering full visibility, traceability, compliance tracking, risk scoring, and an immutable audit trail.
This can help make it possible for your organization to stay in compliance with laws and regulations around the world that govern data privacy, security, and sovereignty.
Multiple KeyControl Compliance Managers can easily be configured to isolate regions or organizational locations as needed.
KeyControl Vaults: Your Keys in the right place to help your company be in compliance.
Many traditional monolithic key management solutions offer only a single, centralized repository for storing keys – which for some use cases can be like putting all your eggs in one basket.
The KeyControl platform offers a new distributed vault architecture supporting the creation of fully isolated vaults that can help your organization meet your compliance obligations related to geographical data residency and data sovereignty mandates for cryptographic assets, while reducing attack surfaces and providing flexible arrangements for disaster recovery (DR) and contingency planning.
KeyControl Vaults for Your Use Cases
Protecting vTPMs for VMs Running Windows 11 Using an External KMS
Learn how to protect your vTPM keys for virtual machines on Windows 11 using Entrust KeyControl key management solution (KMS).
KeyControl Vault for KMIP
Lifecycle management for Key Management Interoperability Protocol (KMIP) workloads utilizing cryptographic keys, including virtualization platforms, backup and recovery, database, and storage.
KeyControl Vault for Databases
Lifecycle management for SQL databases using Transparent Data Encryption (TDE).
KeyControl Vault for Databases (Oracle SQL)
Entrust KeyControl Vault for Databases secures your data with Oracle Database TDE Encryption Keys.
KeyControl Vault for Cloud Key Management (BYOK)
Control and Bring Your Own Keys (BYOK) while leveraging the benefits of the cloud. Ensure the strong provenance of keys and manage key lifecycles, automation, and key backups independent of the cloud provider.
KeyControl Vault for Cloud Key Management (HYOK)
Generate and Hold Your Own Keys (HYOK) throughout their lifecycle (on-premises or in a private cloud), while allowing your cloud service provider (CSP) to use the keys on your behalf.
KeyControl Vault for Privileged Account and Session Management (PASM)
Control Secure Shell (SSH) access and usage of administrative accounts while proactively enforcing security policies and recording privileged user activity in any environment.
KeyControl Vault for Application Security
Address a wide range of data protection use cases by providing data encryption, data tokenization with format-preserving encryption (FPE), data masking, and key management.
KeyControl Quick Reference Guide
Entrust KeyControl combines key lifecycle management and a decentralized vault-based architecture with a comprehensive central policy and compliance management capabilities for a wide range of use cases.
Entrust KeyControl Compliance Manager
Entrust KeyControl Compliance Manager is part of a suite of products designed to manage key lifecycles at scale for encrypted workloads in virtualized environments across on-premises, multi-cloud, and hybrid deployments.
Entrust KeyControl Vault for Secrets Management
With Entrust KeyControl Vault for Secrets Management, businesses can easily manage secrets and access to credentials for resources across on-premises and cloud environments.
Entrust KeyControl Cryptographic Command Line Interface (Crypto CLI)
Devops-friendly command line tool for cryptographic operations for use with KeyControl Vault deployments
Entrust KeyControl Vault for Cloud Keys
Protecting Microsoft 365 highly sensitive data using Double Key Encryption (DKE)
Entrust KeyControl Cryptographic API
Cloud-friendly REST-like interface for cryptographic operations for use with KeyControl Vault deployments
Entrust KeyControl Vault for Cloud Keys
Control access to cloud-based cryptographic keys using KeyControl and Google Cloud Platform (GCP) External Key Manager (EKM)
Cohesity and Entrust
“In the face of persistent threats of cyberattacks, organizations demand cyber resilience for their data,” said Joseph Razavian, head of Security Alliances, Cohesity. “By running Entrust KeyControl 10 in conjunction with the Cohesity Data Cloud, enterprises not only gain automated and simplified encryption key management but can also better secure, manage and unlock value from their data no matter where their data is for comprehensive cyber threat protection."
Joseph Razavian, Head of Security Alliances, Cohesity