With the Keyfactor, you can manage the encryption key lifecycle
for symmetric and asymmetric keys — all through one cloud platform.
Secure More Keys with Cloud Encryption Key Manager
Keyfactor’s encryption key manager delivers secure, centralized, and highly interoperable key and policy management across your enterprise or IoT devices.

Better Encryption Key Management and Access Control

Store
Secrets & Key Management
Administer your entire encryption key lifecycle by implementing policies to control access and key management privileges.

Share
Database Encryption
Manage keys, encrypt data at rest and data in transit through a comprehensive Key Management System (KMS).

Audit
Ensure Authorized Access
Leverage strong user and object policy management that audits when, where, and how encryption keys have been utilized.
FULL KMIP SUPPORT
KMIP Compliant
Protocol
Utilize standard Key Management Interoperability Protocol (KMIP) protocols for creating and managing cryptographic keys.
Get full support for features such as:
- Importing / Exporting keys or data
- Encrypting / Decrypting data
- Signing / Verifying data
- Role-based controls on access, operations, and specific keys

Industry Use Cases

Automotive ECU Manufacturer
Receive an OEM Key and place it on an ECU for vendor identification

IoT Device OEM
Generate and manage high volumes of encryption keys needed for IoT device manufacturing

Manufacturing Auditing
Implement strong access controls and auditing capability to track access to secured keys
HOW IT WORKS
End-to-End Encryption Key Management
Encrypt, decrypt, and sign keys through one cloud platform.


STORE ANY KEY IN THE CLOUD
Bring Your Own Key
(BYOK)
Keep secure keys in the vault and only access them when needed.
Get full support for features such as:
- Import encryption keys into the platform for the management of security objects
- Streamline and organize keys for your organization
Comprehensive Application Security
Keyfactor’s encryption key manager supports all KMIP compliant applications.


KMIP application support
- VMWare, VSAN, and VM encryption
- Database encryption
- Backup and storage encryption

PKCS#11 client
- Oracle TDE for database encryption
- Java-based applications

Application-layer support
- “Building blocks” for corporate encryption strategy
- IoT device key creation
ENTERPRISE POLICY MANAGEMENT
Standardize on Policy
Controls
Manage your symmetric keys with specific policies and standards to safeguard key usage.
- Usage: specify which client groups are allowed to perform operations on an object
- Object: specify metadata to apply to a class of objects
- Action: specify which operations (e.g., create, create key pair, register, query, cancel, poll, discover versions) a client is allowed to perform and how KMIP request will be rejected, accepted, or modified.
- Usage rate-limiting: specify usage limits on any KMIP operation for an object to be applied in a given time duration.
