Best Key Management Software in the UK

Find and compare the best Key Management software in the UK in 2024

Use the comparison tool below to compare the top Key Management software in the UK on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Key Wizard Reviews
    Key Wizard is a key management software program that allows locksmiths and end-users access to detailed information about keys, keyholders, and locations. The program uses a similar format to Microsoft Outlook and features simple-to-navigate screens. One-year free technical support and upgrades Clear and easy-to-read screens Multi level password protection. Multiple end-users can be managed and key systems for most manufacturers can be used. Search, query, and reporting capabilities customized. Global key search across multiple MK system. Comprehensive hardware listings for door locations. Keyholder photos and signatures are displayed for identity verification. Automated reminders for maintenance, back ups, and overdue key. Accurate key symbol sorting. Tracking of key authorization. Key authorization forms and key receipts can be customized. Tracking of key deposits and loaned keys. Archive of maintenance service history records. Importing and exporting key systems.
  • 2
    KeyNest Reviews

    KeyNest

    KeyNest

    $12.99 AUD / key collection
    KeyNest provides Airbnb hosts and property manager with secure key exchange solutions. KeyNest's KeyNest Points makes it easy to handle keys remotely. Over 5,000 Points are available to store and exchange keys with friends, contractors, or guests. KeyNest Points works as follows: KeyNest operates an extensive network of secure drop off locations, which are often referred to by the term "KeyNest points." These can include local businesses, such as cafes or convenience stores. These locations are secure hubs for storing and exchanging keys. Create a Booking. To use KeyNest Points, you must log a key via the KeyNest app or website. This booking allows you specify the key drop off location and the details for your guests' arrivals and departures. Secure Key Storage: After you have made a reservation, you will securely store your keys before passing them on to the guest.
  • 3
    Google Cloud Key Management Reviews
    Global security: You can scale your application to Google's global reach while letting Google handle the key management challenges, such as managing redundancy or latency. Get help achieving your compliance requirements You can easily encrypt your data in cloud using software-backed encryption keys. These keys are certified FIPS 140-2 Level 3, validated HSMs, customer keys, or an External Key Manager. Take advantage of integration with Google Cloud products Customer-managed encryption keys (CMEK), which can be used to control encryption across Google Cloud products, as well as additional security features like Google Cloud IAM or audit logs.
  • 4
    Azure Key Vault Reviews
    Key Vault helps you to improve data protection and compliance To protect cloud data, secure key management is crucial. Azure Key Vault can encrypt keys and small secrets, such as passwords, that are stored in hardware security module (HSMs). You can import or generate keys in HSMs for additional security. Microsoft processes your keys using FIPS validated HSMs (hardware, firmware, and hardware) - FIPS 140-2 level 2 for vaults, and FIPS 140-2 level 3 for HSM pools. Microsoft can't see your keys or extract them with Key Vault. You can monitor and audit key usage with Azure logging-pipe logs to Azure HDInsight, or your security information management (SIEM), for more analysis and threat detection.
  • 5
    RevBits Privileged Access Management Reviews
    Secure and Protect Privileged Credentials, Sessions, and Accounts Everywhere! RevBits Privileged Access Management offers six-in-one solutions that include privileged access, privileged session and password, service accounts and key and certificate management, extensive session logging, keystrokes and video capture, and extensive session logging. Native clients for RevBits Privileged access Management are available on common operating systems. As organizations need to manage access in a more comprehensive manner, so will the number of vendors that they use. RevBits Privileged Access Management was designed to provide comprehensive access management and reduce vendor onboarding. Organizations can manage their access with five integrated modules. Product Features: Hardware Tokens Comprehensive Platform Coverage Password Management - Customizable Audit Logs - Extensive Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 6
    Yandex Key Management Service Reviews
    Protect your secrets, sensitive data, and personal information in the cloud with keys. Create and delete key, set access policies, perform rotation via the Management Console, CLI or API. Yandex KMS supports both symmetric and asymetric cryptography. Use the REST API or RPC to encrypt, decrypt, and sign data using eSignature schemes. Yandex KMS manages access to encrypted data while you control the physical security and reliability of keys. Hardware Security Modules are available. SDKs in Java or Go can be used to encrypt small amounts. The service integrates popular encryption libraries such as the AWS EncryptionSDK and Google Tink to encrypt large amounts of data. Yandex Lockbox integration allows you to encrypt secret data with your own keys. Managed Service for Kubernetes also allows you to protect secrets and data using encryption keys.
  • 7
    Keyzapp Reviews

    Keyzapp

    Zapp Innovation

    $37.53 per month
    Keyzapp was created to make it easy to manage keys and save time. You can manage multiple sets of keys for multiple properties from one place using any internet device. You can personalize our reusable smart fobs by adding your branding and numbering. Automated text messages will chase down keys that are not due. Smart fobs make it easy for you to identify keys and issue them. Everyone in the team can stay consistent with guided processes. Automated reminders ensure keys are returned before they become lost. It eliminates the need to log key custody on paper or in an electronic database. It adapts to your process, making it easy for everyone. Management information provides insight into your process so that you can manage it and improve it. With just a few keystrokes, you can find where keys are. It's easy to follow - no learning required Access anywhere, anytime, on any device. Automated text messages track down keys that are not available. Reports are easy to view and filter for insight on property access.
  • 8
    Logitout Reviews
    Our all-in-one cloud solution reduces business risk. Give your team the tools they require to track everything. You can instantly view all entries on one screen, keeping you up to date in seconds. You can update at any time. Mobile? It's easy to use our mobile scanner and intuitive web application on any device. Going cloud means fast, accurate, secure data. You can access your important log quickly and easily 24/7. Our cloud-based solution requires only internet access and a mobile device. This allows you to access your Dashboard from any location, at any time. Logitout can be used anywhere you want. Our digital dashboard makes spreadsheets obsolete. Our digital dashboard allows you to track and record the exact history of any item. Best of all, it has notifications for overdue. This information is not available in a spreadsheet. Our inbuilt notifications will notify your team and the borrower if an item is late.
  • 9
    Key Organizer Reviews

    Key Organizer

    AIDeX

    $178 one-time payment
    The more keys and people you have, the more difficult it is to manage your key inventory and key handovers in Excelâ„¢. Key Organizer is a simple application program that allows you to keep track of keys and record handovers to key recipients. It can also record locks and doors. Handover receipts and key transfers can be printed. All key transfers can be logged. A locking plan can also be used to record the locking functions of keys or locks. Multiple locking systems can be managed from one location. Multiple users can simultaneously work with the same data. Your data is not stored on a cloud but only on your computer or in your local network. Your sensitive data is safe and secure inside your home. Our program does not require an internet connection. You can purchase the program once and it will not expire. You can test it without any time pressure. We are happy to provide assistance via e-mail.
  • 10
    StorMagic SvKMS Reviews
    We believe that enterprises should have a single point of contact for key management. SvKMS is a single platform that can manage all your encryption keys from anywhere. Customers receive an enterprise key manager that can manage any encryption workflow, at the edge, cloud, data center, or cloud. SvKMS offers enterprise-grade features in an easy to use interface at a surprising low cost. You can deploy anywhere, have high availability without borders, and integrate with any workflow. Advanced key management, powerful reports & authorization, lowest price on large scale. Easy configuration, simple administration, centralized management All encryption key management processes can be unified in a single virtual appliance. SvKMS provides a wide range of risk reduction options via GUI, integrated REST API-enhanced workflows, and KMIP standardization. SvKMS allows for rapid customization, dashboard auditing, and monitoring for all deployment scenarios.
  • 11
    Alliance Key Manager Reviews

    Alliance Key Manager

    Townsend Security

    $4,800 one-time payment
    Your private information is secured once data has been encrypted. Enterprise-level key management is required to protect that data. This solution offers high availability, standards-based enterprise key management to a wide variety of applications and databases. Alliance Key Manager is an FIPS 140-2 compliant enterprise manager that helps organizations comply with compliance requirements and protect private data. The symmetric encryption key management system creates, manages and distributes 128 bit, 192 bit, and 256 bit AES keys for all applications and databases running on any Enterprise operating systems. There are several ways to restrict encryption keys. The highest level of permissibility requires a secure, authenticated TLS session with the key server. Individual encryption keys can be assigned to groups of users or users within specific groups. Enterprise-wide groups can also be created. Keys can be restricted to Enterprise users, groups or specific users within groups.
  • 12
    Keytracker Reviews
    Keytracker professional management software, cabinets and accessories will help you keep track of all your keys and equipment. No more wasting time searching for keys or equipment. Increased efficiency. Greater security. Health & Safety Compliant. Easy to set up. Access for authorized users is quick and easy. Every business needs keys and equipment. However, it can be difficult to keep them safe while still being easily accessible without requiring time-consuming administration. Keytracker products offer a wide range of secure solutions that are quick and easy to use for all businesses. Keytracker products range from a basic key safe box to sophisticated electronic key control systems. They provide efficient solutions for professionally managing business keys and equipment. Any organization can face many challenges when managing keys and other assets that are vital to their daily operations. It is crucial that assets can easily be tracked and controlled in busy environments, where multiple users collect and return shared-use items.
  • 13
    KeyTrak Reviews
    KeyTrak's electronic keys and asset management systems have been helping businesses around the world increase their security and productivity while reducing costs. We believe that the difference is in how we do things, which is why all of our products are sold from a single source. We are able to provide the best possible customer service by conducting all research, development, programming, manufacturing, and support at our College Station headquarters.
  • 14
    Fortanix Data Security Manager Reviews
    A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing.
  • 15
    XCrypt Data Encryption Platform Reviews
    Zettaset products are chosen by customers around the world for their ability to operate in highly-scalable, high-performance data environments. Zettaset products have extremely low latency and can be used to support the most stringent deployment requirements. These include high-speed transactions, in memory databases, and web-based applications. The XCryptâ„¢, Data Encryption Platform was designed from the ground up to provide optimal performance and scalability for distributed systems and elastic clouds environments. XCrypt has extremely low latency, making it ideal to store in-memory data and transactional environments that require sub-second response times.
  • 16
    Venafi Reviews
    Protect all your machine identities. Are you protecting your TLS keys and certificates as well as SSH keys, code signing keys and code signing keys that are used throughout your extended enterprise? Learn how to secure this torrent of constantly changing machine identities. Keep ahead of outages and speed up DevOps security. The Trust Protection Platform powers enterprise solutions that provide visibility, intelligence, and automation to protect machine identity throughout your organization. You can also extend your protection by utilizing hundreds of integrated third-party applications (CAs) and certificate authorities (OTCs) that are out-of-the box. Multiple methods are available to find and provide keys and certificates. Security best practices for certificates should be followed and enforced. Integrate workflow management processes and management of certificate lifecycles. Combine certificate automation and orchestration of keys generated using Hardware Security Modules (HSMs).
  • 17
    ARIA KMS Reviews

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server application (KMS), automatically manages the generation, distribution, and storage of encryption keys. This allows you to manage all aspects of key management's lifecycle. ARIA KMS provides highly scalable encryption key management that can generate thousands of keys per second. This makes it the ideal solution for per data or per-application transactions. It can be configured to meet specific encryption requirements, such as software applications, hardened appliances with high availability, or zero footprint PCIe adapters. Automated configuration and management of KMS reduces risk. Automates key management and configuration in less than an hour, without requiring any specialized knowledge. Secures in-cloud, on-premises, and cloud deployments. Supports Bring Your Own Key (BYOK), security models
  • 18
    Tencent Cloud Key Management Service Reviews
    KMS uses a third-party certified hardware safety module (HSM), to generate keys and protect them. It also utilizes secure data transfer protocols and distributed clustered service deployment, hot backup, and hot backup to ensure availability. Multiple compliance schemes have accredited KMS' security and quality control practices. Key Management Service offers rich management features such as key creation, disabling, rotation settings and alias settings, key details viewing, modification, and enabling. KMS console integrates with CAM, Cloud Monitor, allowing you to easily create keys for access control. Logging is also available for key usage and management operations. KMS allows you use your own key to encrypt or decrypt sensitive data.
  • 19
    IBM Security Guardium Key Lifecycle Manager Reviews
    IBM Security Guardium Key Lifecycle Manager centralizes and simplifies the encryption key management process to help secure encrypted data and simplify key management. It provides secure, robust key storage, key servicing, and key lifecycle management to self-encrypting applications using interoperability protocols such as KMIP, IPP, and REST. Guardium Key Lifecycle Manager assists customers in complying with regulations such as PCI DSS and Sarbanes-Oxley. It provides access control, key rotation, and other automated key management processes. Secure storage and serving of keys at the point of use allows for centralized, transparent and simplified key management. Integration with supported protocols such as KMIP, IPP, and REST is simple and secure. Automates the assignment and rotation keys, reducing key management costs.
  • 20
    Cryptomathic CKMS Reviews
    It is becoming more difficult to manage increasing numbers of cryptographic keys across business apps. Manual, decentralized processes can be costly and error-prone. Also, it takes time and effort to demonstrate compliance. Cryptomathic's CKMS, a centralized key management software, provides automated key updates and distribution to a wide range of applications. CKMS supports robust business processes, manages all keys (symmetrical and asymmetric), and allows you to comply with and pass external audits. The top three key management challenges are: lack of clear ownership, lack of skilled personnel, and isolation and fragmentation of systems. CKMS addresses all of these. It imposes clear roles and responsibilities for key sets; it frees staff of repetitive, manual tasks and allows them focus on policy decisions.
  • 21
    BerryTMS Reviews

    BerryTMS

    DigitalBerry

    BerryTMS makes it easy to centralize and simplify the management of security fleets. Security keys are required for multi-factor authentication and zero trust. Multiple protocols can be supported by security keys, which allow for "passwordless" authentications. These authentications are more secure than simple authentication and more efficient. However, the management of authentication solutions that are based on physical tokens is a challenge. This includes initialization, deployment, and fleet supervision. You can easily and securely deploy security keys in large quantities. You can manage the life cycle of all credentials contained in keys. You can see the entire use of keys within the company. You can manage your keys remotely and securely to enroll your users. You can choose from the options to define the type of enrollment, including distance enrollment, face-to-face enrollment, and VIP enrollment.
  • 22
    Promaster Key Manager Reviews
    ProMaster Key Manager 8 is the best solution for any organisation that requires key tracking and restricted access security. It allows you to track who has your keys and which key holders have access, providing security. This software is used by many organisations, large and small, to provide the best key management and tracking. Your locksmith can use ProMaster Master-Keying 8 for lock system data updates and standalone key systems. ProMaster Key Manager 8 offers a wide variety of security settings that you administrator can grant each user to ensure tight security. Data entry, issue keys, lost keys, etc.) You can even limit who can access each system or key cabinet.
  • 23
    KeyWin Reviews
    KeyWin6 is the most recent version of KeyWin6, the most powerful administrative tool on the market for securely managing keys, valuables, and other information. Administrators can manage keys and key cabinets with the most precise accuracy, anywhere in the world, using the Microsoft Azure IoT technology platform. KeyBox, KeyRack, ValueBox and KeyWin6 give you more options to manage keys, equipment, and valuables. It is easy to grant access to users or groups, and to link them with keys or valuables. You can easily keep track of who is using what with the automatic registration. The search and filter function is designed to simplify your day and give you a better understanding of how keys and items are managed in your company. KeyWin6 cloud services are built around IoT technology via Microsoft Azure. Despite the modern, secure technology.
  • 24
    KeyCop Manager Reviews
    The KeyCop is a smart key ring that can be attached to one or more keys. It has an integrated RFID tag and laser-engraved code. The KeyCop allows you to track who has keys, when they were used, when they were returned, and where they are located. This will help you improve key management in your company. The KeyCop will ensure that your company is secure and prevent lost keys. The KeyCop can be used for manual issuing or collection. It can also be used in combination with CaptureTech's Electronic key cabinets and Electronic lockers. 24/7 Access to all information about who, what and whereabouts. CaptureTech Web Manager gives you a complete overview of all your assets.
  • 25
    SimpleK Reviews
    SimpleK is an intuitive, flexible and complete software for facility management and master key system administration. SimpleK is primarily used by security managers, institutional locksmiths, and facility managers. Design and management of master key systems Key, key ring, and item issuance Cylinders and core pinting Inventory and personal records Floor plans, doors, and buildings SimpleK has many advanced master keying functions to assist you: Master Key System (Many Levels, Multiple Manufacturers Compatible, Different Methods and Options) System expansion managed Calculate Core Pining Stack (Based on the system type & structure and core type, key types, etc.). Plan, Perform, and Register Rekeying Paperless Processes (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible to electronic signature capture devices. This allows electronic handwritten signatures to directly be bound to digital documents.
  • Previous
  • You're on page 1
  • 2
  • Next