Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

JISA Softech has developed the J-KMS, a comprehensive centralized key management system aimed at optimizing the management of cryptographic keys across multiple business applications. This system automates the processes of key updates and distribution, effectively overseeing the entire lifecycle of both symmetric and asymmetric keys. By assigning specific roles and responsibilities for different key sets, J-KMS minimizes manual tasks, enabling staff to concentrate on making policy-related decisions. Furthermore, it supports various standard key formats and adheres to compliance requirements such as PCI-DSS and GDPR. Key functionalities include not only key generation and backup but also restoration, distribution, import/export, audit logging, and encryption via Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), alongside certification using X.509 or EMV certificates. The advantages of utilizing J-KMS include a significant reduction in human error through defined user and admin permissions, more efficient workflows, cost savings due to automation, dual control facilitated by asynchronous processes, tamper-evident records aiding compliance efforts, and comprehensive control over all types and formats of keys within the system. As a result, businesses can achieve enhanced security and operational efficiency while managing their cryptographic assets.

Description

We are convinced that organizations merit a comprehensive solution for managing their encryption keys. SvKMS offers a unified platform that facilitates the management of all encryption keys, regardless of location. Clients can access an enterprise-level key management system suitable for various encryption workflows, whether they operate at the edge, within a data center, in the cloud, or across multiple clouds. With its enterprise-grade functionalities, SvKMS presents a user-friendly interface at an unexpectedly affordable price. It can be deployed anywhere, ensuring high availability without limitations, and supports integration with any operational workflow. The advanced key management capabilities, coupled with robust reporting and authorization features, come at the most competitive price for extensive scaling. Centralized oversight, straightforward configuration, and seamless administration are at the core of the system. By consolidating all encryption key management activities into a unified virtual appliance, SvKMS enhances risk mitigation through a graphical user interface, incorporates REST API-driven workflows, and adheres to KMIP standards, enabling swift customization, comprehensive logging, and effective dashboard auditing and monitoring for various deployment scenarios. This holistic approach ensures that enterprises can efficiently manage their encryption needs while minimizing risks and maximizing operational efficiency.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Cisco Secure Cloud Analytics
Dell EMC NetWorker
Google Cloud Platform
HP-UX
IBM Db2
Lenovo ThinkAgile HX Series
Microsoft Azure
Microsoft Hyper-V
Nutanix AOS Storage
VMware vSphere

Integrations

Amazon Web Services (AWS)
Cisco Secure Cloud Analytics
Dell EMC NetWorker
Google Cloud Platform
HP-UX
IBM Db2
Lenovo ThinkAgile HX Series
Microsoft Azure
Microsoft Hyper-V
Nutanix AOS Storage
VMware vSphere

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

JISA Softech

Country

India

Website

www.jisasoftech.com/jisa-key-management-system-kms/

Vendor Details

Company Name

StorMagic

Founded

2006

Country

United Kingdom

Website

stormagic.com/encryption-key-management/

Product Features

Product Features

Alternatives

Cryptomathic CKMS Reviews

Cryptomathic CKMS

Cryptomathic

Alternatives

ARIA KMS Reviews

ARIA KMS

ARIA Cybersecurity Solutions
iSecurity Field Encryption Reviews

iSecurity Field Encryption

Raz-Lee Security
EncryptRIGHT Reviews

EncryptRIGHT

Prime Factors
Alliance Key Manager Reviews

Alliance Key Manager

Townsend Security