DKE Anchor
Two-tier security for the most sensitive data in Azure

Double Key Encryption

Customers control their Microsoft 365 sensitive data in Azure.

  • Data protection with two keys
  • Customers are in complete control of data protection adding an additional layer of security
  • Solution applicable to all industries

 

Product Type:

Firmware

Delivery Time:

Ask our sales team
Key Benefits

Key Benefits

Icon

Key Life Cycle Management

Securely generate and store encryption keys with Utimaco HSMs that are FIPS 140-2 Level 3 validated, Common Criteria (CC) certified and VS-NfD approved.

Icon

Meet Compliance Standard

Meet the compliance requirements for regulations like GDPR, HIPAA, FISMA, and PCI DSS while securely protecting the keys.

Icon

Flexible Deployment

Utimaco DKE Anchor enables customers to deploy the double key encryption either on-premises or in the cloud.

Details

Details

Sensitive data protection and controlling in Azure Cloud with Utimaco DKE Anchor for Microsoft Purview Double Key Encryption (DKE)

With an ever-increasing collaborative work environment, more and more employees in all industries are using Microsoft 365 on Azure Cloud to enhance productivity and keep the data current. While Microsoft is providing security for customers data, there is a growing need to secure sensitive data. Securing data with encryption keys that are managed and controlled in-house is considered the optimal security practice for Microsoft 365.

With a collaborative and remote working culture, industries are experiencing the increasing demand for data protection along with the necessity to meet the regulatory compliance requirements.

Two-tier security for the most sensitive data in Azure Cloud
Utimaco DKE Anchor is an enhanced security offering for Double Key Encryption (DKE) with Microsoft Purview (formerly Microsoft 365 Compliance) , which is increasingly being utilized by industries like Automotive & Integrated Mobility, Government & Public Sector, eHealth, etc. complying with the regulations such as GDPR, FISMA, and eIDAS.

Utimaco DKE Anchor is the solution of choice for double key encryption where:

  • Customers want to protect sensitive data on Azure cloud
  • Customers need to meet compliance mandates

How security & control is achieved for DKE
Double Key Encryption (DKE) works on the principle of using two keys for protecting sensitive data in the cloud. One key is stored at the customers location of choice in FIPS 140-2 validated, Common Criteria (CC) certified and VS-NfD approved HSM, while another key is hosted in Azure. Should a key be compromised that is outside of customer’s control, the data remains secure. Without access to both keys, the relevant data remains securely encrypted.

DKE Anchor Chart

 

Utimaco DKE Anchor helps increase trust in the digital society by using a double key encryption process. It enables the industries to secure the data with trusted key control and management.

Utimaco experts will help you to create a DKE strategy including an implementation and deployment outline. With FIPS validated, Common Criteria (CC) certified and VS-NfD approved Hardware Security Modules and Utimaco DKE Anchor, industries can integrate the double key encryption solution for Microsoft 365.

Technical Specifications

Supported Cryptographic Interfaces (APIs)

  • PKCS #11

Fulfills various security compliance mandates

  • FIPS 140-2 Level 3
  • Common Criteria (CC)
  • VS-NfD
  • GDPR
  • HIPAA
  • FISMA
  • PCI DSS

On-premise

Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance

 

Bundles 

SecurityServer
 

Our general-purpose HSM that ensures the 
security of cryptographic key material for 
servers and applications.

Find more details

CryptoServer CP5
 

Our certified HSM specifically designed for eIDAS-compliant qualified signatures and seals, remote signing and the issuing of qualified certificates.

Find more details

u.trust Anchor CSAR
 

The world’s first converged crypto platform for payment and general purpose HSM use case enabling to offer HSM-as-a-Service and providing true multi-tenancy.

 Find more details

 

Contact us

We look forward to answering your questions.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0