J-KMSJISA Softech
|
Thales Data Protection on DemandThales Cloud Security
|
|||||
Related Products
|
||||||
About
JISA Softech's J-KMS is a centralized key management system designed to streamline the management of cryptographic keys across various business applications. It automates key updates and distribution, handling the entire lifecycle of both symmetric and asymmetric keys. J-KMS enforces specific roles and responsibilities for key sets, reducing manual tasks and allowing staff to focus on policy decisions. It supports standard key formats and ensures compliance with standards like PCI-DSS and GDPR. Key functions include key generation, backup, restoration, distribution, import/export, audit logging, encryption using Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), and certification with X.509 or EMV certificates. Benefits of J-KMS encompass reduced human error through user and admin permissions, streamlined processes, cost reduction via automation, dual control with asynchronous workflows, tamper-evident records for compliance, and system-wide key control for any key type and format.
|
About
The award-winning Thales Data Protection on Demand (DPoD) is a cloud‑based platform providing a wide range of cloud HSM and key management services through a simple online marketplace. Deploy and manage key management and hardware security module services, on‑demand and from the cloud. Security is now simpler, more cost-effective, and easier to manage because there is no hardware to buy, deploy, and maintain. Just click and deploy the services you need in the Data Protection on Demand marketplace, provision users, add devices, and get usage reporting in minutes. Data Protection on Demand is cloud agnostic, so regardless of whether you use Microsoft Azure, Google, IBM, or Amazon Web Services or a combination of cloud and on-premises solutions, you are always in control of your encryption keys. There is no hardware or software to buy, support, and update, so you don’t have any capital expenditures.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Organizations wanting a solution to manage their cryptographic keys to enhance security
|
Audience
Companies requiring a solution to manage cryptographic keys and protect sensitive data across diverse environments
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationJISA Softech
India
www.jisasoftech.com/jisa-key-management-system-kms/
|
Company InformationThales Cloud Security
Founded: 2001
United States
cpl.thalesgroup.com/encryption/data-protection-on-demand
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
IBM Cloud
Microsoft Azure
|
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
IBM Cloud
Microsoft Azure
|
|||||
|
|
|