Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

JISA Softech has developed the J-KMS, a comprehensive centralized key management system aimed at optimizing the management of cryptographic keys across multiple business applications. This system automates the processes of key updates and distribution, effectively overseeing the entire lifecycle of both symmetric and asymmetric keys. By assigning specific roles and responsibilities for different key sets, J-KMS minimizes manual tasks, enabling staff to concentrate on making policy-related decisions. Furthermore, it supports various standard key formats and adheres to compliance requirements such as PCI-DSS and GDPR. Key functionalities include not only key generation and backup but also restoration, distribution, import/export, audit logging, and encryption via Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), alongside certification using X.509 or EMV certificates. The advantages of utilizing J-KMS include a significant reduction in human error through defined user and admin permissions, more efficient workflows, cost savings due to automation, dual control facilitated by asynchronous processes, tamper-evident records aiding compliance efforts, and comprehensive control over all types and formats of keys within the system. As a result, businesses can achieve enhanced security and operational efficiency while managing their cryptographic assets.

Description

Salesforce Shield is an enterprise-grade security suite built to safeguard critical and sensitive data within Salesforce environments. It empowers organizations to proactively defend against internal misuse and external threats while maintaining compliance with evolving privacy regulations. Event Monitoring delivers deep operational insight by capturing over 50 types of system events, including logins, API calls, and report exports. Real-time alerts and transaction security policies help teams respond immediately to suspicious activity. Platform Encryption protects data at rest across fields, files, and attachments, while enabling companies to manage their own encryption keys. Field Audit Trail enhances governance by retaining long-term historical data changes for compliance and investigations. Data Detect scans Salesforce environments to uncover and classify sensitive information using intelligent pattern recognition. These capabilities provide a clear view of who accessed what data and when. Integrated tools like Security Center and Privacy Center further streamline governance and consent management. Salesforce Shield strengthens resilience, reduces risk exposure, and builds trust in AI-driven enterprise operations.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Salesforce

Integrations

Salesforce

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$25 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

JISA Softech

Country

India

Website

www.jisasoftech.com/jisa-key-management-system-kms/

Vendor Details

Company Name

Salesforce

Founded

1999

Country

United States

Website

www.salesforce.com/platform/shield/

Product Features

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

Cryptomathic CKMS Reviews

Cryptomathic CKMS

Cryptomathic

Alternatives

Alliance Key Manager Reviews

Alliance Key Manager

Townsend Security
PK Protect Reviews

PK Protect

PKWARE
HashiCorp Vault Reviews

HashiCorp Vault

HashiCorp