Best Encryption Key Management Software

Products Buyer's Guide
9.4
Akeyless Vault
★★★★★

Akeyless Vault

Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments

As a centralized secrets management solution, AKeyless fixes a key risk and makes development easier - Conor M.

Ease of use
Support
Ease of Setup

Languages supported: English

8.8
Egnyte
★★★★★

Egnyte

Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.

Egnyte is a great tool for sharing files easily and securely. - Clara S.

Ease of use
8.8
Support
8.7
Ease of Setup
8.5

Languages supported: German, English, French, Polish, Russian, Spanish, Turkish, Chinese (Simplified)

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

9.4
OpenSSH
★★★★★

OpenSSH

OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.

The definitive way to administer servers - Massimiliano A.

Ease of use
8.7
Support
9.9
Ease of Setup
8.9
8.6
HashiCorp Vault
★★★★★

HashiCorp Vault

HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach

Vault A Game Changer In Secret Management - Chaminda M.

Ease of use
7.8
Support
8.6
Ease of Setup
0.0

Languages supported: English

8.4
Azure Key Vault
★★★★★

Azure Key Vault

Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.

Azure Keyvault feedback after use it for 1.5Yr - Sagar T.

Ease of use
7.7
Support
8.4
Ease of Setup
8.4
8.6
AWS Key Management Service (KMS)
★★★★★

AWS Key Management Service (KMS)

AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

Great service to encrypt data in aws - User in Retail

Ease of use
8.3
Support
8.4
Ease of Setup
8.7
9.0
Keyfactor Command
★★★★★

Keyfactor Command

Keyfactor Command, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.

Automates everything certificate! - Madhav K.

Ease of use
8.6
Support
9.1
Ease of Setup
8.2
9.0
Venafi TLS Protect
★★★★★

Venafi TLS Protect

Provides dynamic protection for machine identities across your extended infrastructure in one trust platform. Global visibility, deep intelligence and automation of all aspects of machine identities allow you to rapidly identify and automatically correct vulnerabilities and weaknesses in keys and certificates at machine speed and scale.

Venafi is solid. Easy to navigate and integrate into existing system. - Seth G.

Ease of use
Support
Ease of Setup
8.6
Google Titan Security Key
★★★★★

Google Titan Security Key

Titan Security Keys are phishing-resistant two-factor authentication (2FA) devices that help protect high-value users such as IT admins. Titan Security Keys work with popular browsers and a growing ecosystem of services that support FIDO standards.

A Great, Well-built Product but still figuring some thing things you. - Administrator in Accounting

Ease of use
Support
Ease of Setup
7.6
Vormetric Data Security Platform
★★★★★

Vormetric Data Security Platform

Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

Vormetric Encryption Platform - Administrator in Insurance

Ease of use
Support
Ease of Setup
10.0
Hardware Security Modules (HSMs)
★★★★★

Hardware Security Modules (HSMs)

nShield hardware security modules (HSMs) provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more.

Best Reliable and Most Secure General Purpose HSM's from nCipher - Rahul P.

Ease of use
Support
Ease of Setup
10.0
SafeNet Data Protection On Demand
★★★★★

SafeNet Data Protection On Demand

Safenet ProtectDrive is identity and data protection solutions to protect the data, identities, and intellectual property.

Deploy the service in no time to protect to get on demand encryption for data security - Nishant A.

Ease of use
Support
Ease of Setup
9.2
TokenEx
★★★★★

TokenEx

TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.

Best solution for tokenization - Adam F.

Ease of use
9.3
Support
9.3
Ease of Setup
9.4
8.6
AWS CloudHSM
★★★★★

AWS CloudHSM

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

Hardware security module with custom encryption key - Sumit M.

Ease of use
8.7
Support
8.3
Ease of Setup
0.0
8.0
Box KeySafe
★★★★★

Box KeySafe

With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.

Box is great for keeping and sharing documents securely. - User in Financial Services

Ease of use
9.4
Support
10.0
Ease of Setup
9.2
8.4
GnuPG
★★★★★

GnuPG

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

GNUPG: Email/File Privacy for Everyone - David H.

Ease of use
6.1
Support
0.0
Ease of Setup
0.0
9.0
Google Cloud Key Management Service
★★★★★

Google Cloud Key Management Service

Google Cloud KMS is a cloud-hosted key management service that lets users manage encryption for their cloud services the same way they do on-premises.

Generate, use, rotate and destroy AES256 encryption keys - User in Higher Education

Ease of use
Support
Ease of Setup
9.0
Cryptlex
★★★★★

Cryptlex

Cryptlex allows you to license and distribute your desktop apps, mobile apps, on-premise software, IoT apps and other digital goods effortlessly

Great Platform - Andrei A.

Ease of use
Support
Ease of Setup
10.0
Google Cloud HSM
★★★★★

Google Cloud HSM

Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 certified HSMs.

Safe at home - User in Individual & Family Services

Ease of use
Support
Ease of Setup
10.0
Alibaba Key Management Service
★★★★★

Alibaba Key Management Service

Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

Excellent key creation service for the protection of business data - Leonore J.

Ease of use
Support
Ease of Setup
10.0
SecurityFirst
★★★★★

SecurityFirst

SecurityFirst provides innovative and affordable software solutions that protect one of the world's most valuable assets – digital data.

SecurityFirst is top notch - User in Government Administration

Ease of use
Support
Ease of Setup
10.0
ManageEngine Key Manager Plus
★★★★★

ManageEngine Key Manager Plus

ManageEngine Key Manager Plus is a web-based SSH key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys. It provides visibility into the SSH environment and helps administrators take total control of the keys to preempt breaches and compliance issues.

MDM worth every penny! Easy to get started, lots of functionality! - Administrator in Hospitality

Ease of use
Support
Ease of Setup
10.0
Lockr
★★★★★

Lockr

Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable solutions for all sites to properly manage access and encryption keys. Lockr's offsite key management solution protects against critical vulnerabilities, delivers best-practice security to help sites comply with many industry regulations, and provides a Defense in Depth approach to securing your data.

Lockr Encryption for Wordpress - User in Design

Ease of use
Support
Ease of Setup

Languages supported: English

0.0
Thales KeySecure
★★★★★

Thales KeySecure

Gemalto SafeNet KeySecure by Gemalto offers a secure, automated, centralized key management system. Store and manage data encryption keys for hundreds to thousands of encryption appliances and endpoints.

GUI like you've never seen before. - Charles P.

Ease of use
Support
Ease of Setup
0.0
payShield HSM
★★★★★

payShield HSM

payShield 9000 supports payment applications for contact chip, contactless chip and mobile secure elements. The solution addresses evolving standards from EMVCo, PCI SSC, GlobalPlatform and Multos International.

Most Secure and Compliance Approved Payment HSM from Thales - Internal Consultant in Computer & Network Security

Ease of use
Support
Ease of Setup
0.0
Ubiq Encryption Platform
★★★★★

Ubiq Encryption Platform

The Ubiq platform is an API-based developer platform that enables developers to quickly build customer-side data encryption (your data stays with you) into any application, across multiple programming languages, without requiring prior encryption knowledge or expertise. And as new cryptography and encryption innovations emerge, we adopt them into our platform, so you don't have to.

-

Ease of use
Support
Ease of Setup

Languages supported: English

B2B Software Guide