Learn More

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 6 Ratings

Total
ease
features
design
support

Description

IBM Guardium Key Lifecycle Manager streamlines the encryption key management process, enhancing security for encrypted data while making key management more straightforward and automated. This solution provides a secure and powerful means of key storage, serving, and lifecycle management tailored for self-encrypting applications, utilizing interoperability protocols such as KMIP, IPP, and REST. By implementing Guardium Key Lifecycle Manager, organizations can more effectively comply with various regulations like PCI DSS, Sarbanes-Oxley, and HIPAA, as it includes essential features such as access control and automated key rotation. The system ensures centralized, transparent, and simplified key management through the secure handling of key material and on-demand key serving. It facilitates seamless integration with supported protocols, which enhances its functionality significantly. Additionally, the automation of key assignment and rotation not only increases security but also helps in minimizing the overall costs associated with key management. Overall, Guardium Key Lifecycle Manager represents a comprehensive solution for organizations looking to enhance their encryption practices while maintaining regulatory compliance.

Description

QuantaStor, a unified Software Defined Storage platform, is designed to scale up and down to simplify storage management and reduce overall storage costs. QuantaStor storage grids can be configured to support complex workflows that span datacenters and sites. QuantaStor's storage technology includes a built-in Federated Management System that allows QuantaStor servers and clients to be combined to make management and automation easier via CLI and RESTAPIs. QuantaStor's layered architecture gives solution engineers unprecedented flexibility and allows them to design applications that maximize workload performance and fault tolerance for a wide variety of storage workloads. QuantaStor provides end-to-end security coverage that allows multi-layer data protection for cloud and enterprise storage deployments.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon S3
Docker
Grafana Cloud
IBM Cloud
IBM Cloud Object Storage
IBM Guardium
Kemp LoadMaster
Mattermost
Microsoft Azure
Nagios Core
PagerDuty
Rackspace OpenStack
Slack
Wasabi
Zabbix

Integrations

Amazon S3
Docker
Grafana Cloud
IBM Cloud
IBM Cloud Object Storage
IBM Guardium
Kemp LoadMaster
Mattermost
Microsoft Azure
Nagios Core
PagerDuty
Rackspace OpenStack
Slack
Wasabi
Zabbix

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$/TB based on scale
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/guardium-key-lifecycle-manager

Vendor Details

Company Name

OSNexus

Founded

2010

Country

United States

Website

www.osnexus.com

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Product Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Data Replication

Asynchronous Data Replication
Automated Data Retention
Continuous Replication
Cross-Platform Replication
Dashboard
Instant Failover
Orchestration
Remote Database Replication
Reporting / Analytics
Simulation / Testing
Synchronous Data Replication

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

iSecurity Field Encryption Reviews

iSecurity Field Encryption

Raz-Lee Security

Alternatives

FalconStor Reviews

FalconStor

FalconStor Software
Ubiq Reviews

Ubiq

Ubiq Security
StorMagic SvHCI Reviews

StorMagic SvHCI

StorMagic