![紫色六角图案](/static/sites/default/files/2024-02/hero-bg-hex-puple-gradient-1900x345.jpg)
![一个穿着漂亮的毛衣和衬衫站在服务器机房里看着电脑的男人](/static/sites/default/files/2023-12/man-laptop-mgmtandmonitoring-800x800.jpg)
使用分散式保管库和全面的合规性管理仪表板管理加密密钥和机密。
Redefining Cryptographic Key and Secrets Management
统一的仪表板可实现密钥和机密的精细可见性
详细的指标可确定合规程度,并对禁止使用的密钥发出警报
基于保管库的分散式架构
通过 KeyControl 实现本地部署
通过 KeyControl 即服务启用的即服务部署
Try KeyControl for Free
Sign up for a 30-day free trial of Entrust KeyControl to experience complete control of your encryption key lifecycle in the cloud.
![woman in yellow shirt and glasses and man looking down at large laptop screen](/static/sites/default/files/2024-01/woman-man-laptop-compliance-manager-500x500.jpg)
Controlling your keys means managing your risks
KeyControl Compliance Manager 策略引擎提供对加密 密钥 和 机密 的细粒度控制,提供完整的可见性、可追溯性、合规性跟踪和不可变的审计跟踪。
This can help make it possible for your organization to stay in compliance with laws and regulations around the world that govern data privacy, security, and sovereignty.
Multiple KeyControl Compliance Managers can easily be configured to isolate regions or organizational locations as needed.
KeyControl Vaults: Your Keys in the right place to help your company be in compliance.
Many traditional monolithic key management solutions offer only a single, centralized repository for storing keys – which for some use cases can be like putting all your eggs in one basket.
The KeyControl platform offers a new distributed vault architecture supporting the creation of fully isolated vaults that can help your organization meet your compliance obligations related to geographical data residency and data sovereignty mandates for cryptographic assets, while reducing attack surfaces and providing flexible arrangements for disaster recovery (DR) and contingency planning.
![man in apron holding tablet in right hand and pointing to barrels with left hand](/static/sites/default/files/2024-01/man-keycontrol-vaults-500x500.jpg)
KeyControl Vaults for Your Use Cases
KeyControl Vault for KMIP
Lifecycle management for Key Management Interoperability Protocol (KMIP) workloads utilizing cryptographic keys, including virtualization platforms, backup and recovery, database, and storage.
适用于数据库的 KeyControl Vault
High assurance FIPS 140-2 Level 3 root of trust and key lifecycle management for SQL databases using Transparent Data Encryption (TDE).
KeyControl Vault for Databases (Oracle SQL)
Entrust KeyControl Vault for Databases secures your data with Oracle Database TDE Encryption Keys.
KeyControl Vault for Cloud Key Management (BYOK)
Control and Bring Your Own Keys (BYOK) while leveraging the benefits of the cloud. Ensure the strong provenance of keys and manage key lifecycles, automation, and key backups independent of the cloud provider.
KeyControl Vault for Cloud Key Management (HYOK)
Generate and Hold Your Own Keys (HYOK) throughout their lifecycle (on-premises or in a private cloud), while allowing your cloud service provider (CSP) to use the keys on your behalf.
KeyControl Vault for Privileged Account and Session Management (PASM)
Control Secure Shell (SSH) access and usage of administrative accounts while proactively enforcing security policies and recording privileged user activity in any environment.
KeyControl Vault for Tokenization
Address a wide range of data protection use cases by providing data encryption, data tokenization with format-preserving encryption (FPE), data masking, and key management.
KeyControl Quick Reference Guide
Entrust KeyControl combines key lifecycle management and a decentralized vault-based architecture with a comprehensive central policy and compliance management capabilities for a wide range of use cases.
Entrust KeyControl Compliance Manager
Entrust KeyControl Compliance Manager is part of a suite of products designed to manage key lifecycles at scale for encrypted workloads in virtualized environments across on-premises, multi-cloud, and hybrid deployments.
Entrust KeyControl Vault for Secrets Management
With Entrust KeyControl Vault for Secrets Management, businesses can easily manage secrets and access to credentials for resources across on-premises and cloud environments.
Entrust KeyControl Cryptographic Command Line Interface (Crypto CLI)
Devops-friendly command line tool for cryptographic operations for use with KeyControl Vault deployments
Entrust KeyControl Vault for Cloud Keys
Protecting Microsoft 365 highly sensitive data using Double Key Encryption (DKE)
Entrust KeyControl Cryptographic API
Cloud-friendly REST-like interface for cryptographic operations for use with KeyControl Vault deployments
![白色左引号图标](/static/sites/default/files/2023-12/qutoe-marks-left-white-icon.png)
Cohesity and Entrust
“In the face of persistent threats of cyberattacks, organizations demand cyber resilience for their data,” said Joseph Razavian, head of Security Alliances, Cohesity. “By running Entrust KeyControl 10 in conjunction with the Cohesity Data Cloud, enterprises not only gain automated and simplified encryption key management but can also better secure, manage and unlock value from their data no matter where their data is for comprehensive cyber threat protection."
Joseph Razavian, Head of Security Alliances, Cohesity