IBM Security Guardium Key Lifecycle Manager Description

IBM Security Guardium Key Lifecycle Manager centralizes and simplifies the encryption key management process to help secure encrypted data and simplify key management. It provides secure, robust key storage, key servicing, and key lifecycle management to self-encrypting applications using interoperability protocols such as KMIP, IPP, and REST. Guardium Key Lifecycle Manager assists customers in complying with regulations such as PCI DSS and Sarbanes-Oxley. It provides access control, key rotation, and other automated key management processes. Secure storage and serving of keys at the point of use allows for centralized, transparent and simplified key management. Integration with supported protocols such as KMIP, IPP, and REST is simple and secure. Automates the assignment and rotation keys, reducing key management costs.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
IBM
Year Founded:
1911
Headquarters:
United States
Website:
www.ibm.com/products/ibm-security-key-lifecycle-manager

Media

IBM Security Guardium Key Lifecycle Manager Screenshot 1
Recommended Products
Convert CentOS to Red Hat Enterprise Linux on Azure Icon
Convert CentOS to Red Hat Enterprise Linux on Azure

Streamline your CentOS migration journey by moving workloads to Red Hat Enterprise Linux on Azure.

CentOS Linux is experiencing End of Life on June 30th, leading to potential gaps in security. With Red Hat Enterprise Linux on Azure, IT Teams can streamline the migration of CentOS Linux workloads knowing they don’t have to compromise on security, scalability, or reliability, and can simplify management. Securely accelerate innovation and unlock a competitive edge with an enterprise-grade Linux on Azure.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars
In Person
Videos
Customer Support
Phone Support
24/7 Live Support
Online

IBM Security Guardium Key Lifecycle Manager Features and Options

Encryption Software

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Key Management Software

Access Controls/Permissions
Alerts/Notifications
Audit Trail
Barcoding / RFID
Check-in / Check-out
Key Holder Management
Lock Management
Master Key Management
Overdue Tracking