Streamlining Key Management for Cloud Services

Control encryption keys and policies, to leverage cloud services fully while minimizing complexity and risk

Vormetric Key Management as a Service

For virtually every organization today, the adoption of cloud services continues to expand—and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys, and the potential risks. With Vormetric Key Management as a Service (KMaaS), your organization can establish strong controls over encryption keys and policies for data encrypted by cloud services.

Vormetric Key Management as a Service

Gain Strong Key Control

Leverage cloud services, while establishing the separation of duties, compliance reporting, and lifecycle management that meets corporate and auditor requirements.

Enjoy Fast, Flexible Implementation

Deploy in the cloud or on-premises. Either way, this key management solution features an intuitive, easy-to-use interface, simple implementation, and instant scalability.

Control Keys Over their Lifecycle

Leverage the bring your own key (BYOK) APIs provided by cloud vendors to gain full control over the key management lifecycle, including key creation, uploading, updating, storing, revocation, and reporting.

Choose from On-premises or Cloud Deployment

Vormetric KMaaS features the following offerings:

  • Cloud service. Cloud-based key management enables you to leverage the benefits of a FIPS 140-2 Level 1 solution in the cloud, which means there’s no need to architect, deploy, and maintain a high-availability key management solution on-premises.
  • On-premises service, enabling you to store keys on up to a FIPS 140-2 Level 3-certified hardware appliance on your premises—while leveraging a subscription-based, pay-as-you go pricing model.
Efficient Operational Capabilities

KMaaS offers an easy-to-use portal for encryption key management, and it offers push-button capabilities for creating and modifying keys and policies.

Robust Security Visibility and Controls

With KMaaS, you get capabilities that offer strong safeguards for your sensitive cloud assets:

  • Separates key storage from data repositories, addressing critical security standards
  • Comprehensive, granular audit logs of encryption key and certificate management activities
Supported SaaS providers: Salesforce

Requirement: Salesforce Platform Encryption

FIPS 140-2 Level 1 SaaS

OAuth Federation Salesforce integration

Demo : Vormetric Key Management for Salesforce

Vormetric Key Management for Salesforce now offers you the freedom to choose how to manage your keys. Whether you manage tour keys “as-a-Service” or “on-premises” Vormetric integrates with Salesforce Shield’s BYOK feature and assures customers control the lifecycle of their encryption keys in a segregated, cost efficient manner. Vormetric Key Management for Salesforce is easy to deploy, instantly scalable and enables lifecycle key management including key creation, uploading, updating, storing and deletion.


Solution Brief : Key Management for Salesforce Shield Platform Encryption

The Salesforce Shield Platform Encryption service delivers powerful, natively integrated data-at-rest encryption capabilities that enable customers to secure and control sensitive fields and attachments. Vormetric Key Management as a Service integrates with Salesforce Shield feature and assures customers control the lifecycle of their encryption keys in a segregated, cost efficient manner. Read the solution brief!


White Paper : Key Management for Software-as-a-service (SaaS), ESG

The use of SaaS applications such as a, ServiceNow, Workday, Box, and others has become the standard for the way many organizations conduct business, resulting in corporate data being sent northbound to the cloud. While native and third-party encryption options including bring your own key (BYOK) are now being offered for many cloud services, challenges remain, including operationalizing the management of the encryption key lifecycle and the compliance requirements of some industry regulations to store keys separately from the encrypted data.

Посмотрите интерактивное демо Подробнее
Записаться на демо Записаться
Свяжитесь со специалистом Свяжитесь с нами