Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Strengthen your data security and compliance through the use of Key Vault. Effective key management is crucial for safeguarding cloud data. Implement Azure Key Vault to encrypt keys and manage small secrets such as passwords that utilize keys stored in hardware security modules (HSMs). For enhanced security, you have the option to either import or generate keys within HSMs, while Microsoft ensures that your keys are processed in FIPS validated HSMs, adhering to standards like FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. Importantly, with Key Vault, Microsoft does not have access to or extract your keys. Additionally, you can monitor and audit your key usage through Azure logging, allowing you to channel logs into Azure HDInsight or integrate with your security information and event management (SIEM) solution for deeper analysis and improved threat detection capabilities. This comprehensive approach not only enhances security but also ensures that your data remains compliant with industry standards.

Description

JISA Softech has developed the J-KMS, a comprehensive centralized key management system aimed at optimizing the management of cryptographic keys across multiple business applications. This system automates the processes of key updates and distribution, effectively overseeing the entire lifecycle of both symmetric and asymmetric keys. By assigning specific roles and responsibilities for different key sets, J-KMS minimizes manual tasks, enabling staff to concentrate on making policy-related decisions. Furthermore, it supports various standard key formats and adheres to compliance requirements such as PCI-DSS and GDPR. Key functionalities include not only key generation and backup but also restoration, distribution, import/export, audit logging, and encryption via Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), alongside certification using X.509 or EMV certificates. The advantages of utilizing J-KMS include a significant reduction in human error through defined user and admin permissions, more efficient workflows, cost savings due to automation, dual control facilitated by asynchronous processes, tamper-evident records aiding compliance efforts, and comprehensive control over all types and formats of keys within the system. As a result, businesses can achieve enhanced security and operational efficiency while managing their cryptographic assets.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Azure Blob Storage
Azure Blockchain Workbench
Azure Confidential Computing
Azure DevTest Labs
Centreon
CertPing
CertSecure Manager
ContraForce
Devolutions Remote Desktop Manager
Doppler
F5 NGINXaaS for Azure
IBM Unified Key Orchestrator
JSCAPE MFT Server
Jovu
Microsoft Azure
Privacera
Protegrity
QSE
Securden Password Vault for Enterprises

Integrations

Azure Blob Storage
Azure Blockchain Workbench
Azure Confidential Computing
Azure DevTest Labs
Centreon
CertPing
CertSecure Manager
ContraForce
Devolutions Remote Desktop Manager
Doppler
F5 NGINXaaS for Azure
IBM Unified Key Orchestrator
JSCAPE MFT Server
Jovu
Microsoft Azure
Privacera
Protegrity
QSE
Securden Password Vault for Enterprises

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Microsoft

Founded

1975

Country

United States

Website

azure.microsoft.com/en-us/services/key-vault/

Vendor Details

Company Name

JISA Softech

Country

India

Website

www.jisasoftech.com/jisa-key-management-system-kms/

Product Features

Alternatives

Alliance Key Manager Reviews

Alliance Key Manager

Townsend Security

Alternatives

Cryptomathic CKMS Reviews

Cryptomathic CKMS

Cryptomathic
HashiCorp Vault Reviews

HashiCorp Vault

HashiCorp
Alliance Key Manager Reviews

Alliance Key Manager

Townsend Security