digital cloud
The fully managed service providing converged KMS and HSM capabilities

Enterprise Key Manager as a Service

Utimaco's fully managed solution for holistic generation, management and storage of cryptographic keys

  • Cloud-native KMS
  • Integrated HSM Capabilities
  • External Cloud Key Store
  • Fully Managed

Product Type:

As-a-service

Delivery Time:

Immediate
Key Benefits

Key Benefits

Icon

Cloud-native KMS

Highly available Key Management System (KMS) as a Service with industry-leading SLA’s enabling you to centrally and securely manage all your keys. 

Icon

Integrated HSM Capabilities

Seamlessly integrated with Utimaco’s Hardware Security Module as a Service (HSMaaS) for secure key generation, storage and control. 

Icon

External Cloud Key Store

Integrates with all major Cloud Service Providers (CSPs) as external key storage outside of cloud environments, to reliably separate your keys from your data. 

Icon

Fully Managed

Fully managed and geo-redundant service, hosted in Utimaco’s data centers, providing the converged capabilities of KMS and HSM.

Details

Details

Our fully managed converged service combines the capabilities of a Key Management System (KMS) with the ones of a General Purpose Hardware Security Module (GP HSM), enabling holistic generation, management and storage of your cryptographic keys, independent if they are utilized on-premises or in the cloud.  

This provides you with the ideal solution for central data security based on the reliable separation of your crypto material from your data. 

Based on our long-standing and industry-proven KMS and HSM technology, Enterprise Key Manager aaS provides you with enhanced control over your key inventory by their reliable generation, storage as well as centralized management throughout all cloud and on-premises environments and throughout their complete lifecycle. 

Benefit from its capabilities as external KMS to keep your cryptographic material off your cloud environment and though centrally accessible and manageable through one single pane of glass. 

This service leverages from the capabilities of a PCI and FIPS-certified HSM, to work as the Root of Trust for securing organization’s data infrastructure. The encryption keys are always secured by an organization’s own master key, enabling them to keep complete control of their crypto material.

Leveraging from this service shrinks down your on-premises costs related to hardware, software and facilities while reducing your workload. With that you can enhance your security level and achieve compliance to various regulatory and legal requirements such as Cloud Resilience Act (CRA), Patron Act, NIST or NIS2.

Our Enterprise Key Manager aaS is designed to integrate with leading CSPs and yet be cloud-independent, providing you with the largest level of cloud utilization opportunities without any CSP or vendor lock-in scenarios. 

Fully hosted and managed in Utimaco’s highly available and geo-redundant data centers, Enterprise Key Manager aaS is the central solution for the security of your data, starting with the secure generation of high-quality cryptographic keys and their reliable protection based on the integrated GP HSM capabilities, to their central management and control. 

Certifications and Compliance

  • FIPS 140-2 Level 3 (for HSM)
  • FIPS 140-2 Level 1 (for KMS)
  • PCI DSS
  • ISO9001
  • ISO14001
  • ISO27001
  • NIST SP800-53
     

Supported Cryptographic Interfaces

  • KMIP
  • RESTful interface API
  • KMS
  • PKCS #11
  • SQL, SQLEKM
  • JCE
  • CSP, CNG, CXI
  • Supports all leading KMIP, TDE and Cloud integrations

Supported Cryptographic Algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA 
  • DH, ECDH with NIST, Brainpool and Montgomery curves 
  • Edwards curves Ed25519 and Ed448 
  • AES, Triple-DES, DES 
  • MAC, CMAC, HMAC 
  • SHA-1, SHA-2, SHA-3, RIPEMD
     

 

  • Hosted in an ISO/IEC 27001, HIPAA, PCI compliant data centers (located in Europe & Americas)
  • Geo-Redundant and highly fault tolerant service and infrastructure setup
  • Key security in your control with your master key
     

As a service

Our as a service options are hosted by Utimaco in certified data centers and include everything from set-up to deployment to maintenance.

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.