Advanced
Key Management

The Right Keys for the Job

As organizations shift more of their data and business processes to the cloud, data protection and key management become more complex. Furthermore, effective key management is essential for any encryption system.

Many organizations also need to maintain full control over their encryption keys to comply with contractual requirements, regulatory mandates, and/or internal policies. The right key management solution will ensure that sensitive data is protected against theft or misuse while eliminating the risk that your company will lose access to its own data.

icon

Passphrases

Use system-generated or user-created passphrases based on company policy.

icon

OpenPGP

Extract and decrypt files that comply with the OpenPGP standard, create OpenPGP files, and apply digital signatures.

icon

Contingency Keys

Decrypt files that were encrypted by anyone in the organization, whether the files were passphrase-encrypted or encrypted for specific recipients.

icon

X.509 Certificates

Sign, encrypt, and decrypt files with the most widely used format for public key infrastructure.

icon

Smartkeys

A key specific to PKWARE operations that links encryption keys with user identities for greater control in or out of the company network.

icon

Microsoft Double Key Encryption Integration

Utilize the seamless experiences with encrypted Office file types along with the benefit of knowing that no one else outside the organization can decrypt the files, including Microsoft.

Data Mobility
with Data Security

Shifting data to the cloud makes data protection and key management more complex. Organizations need to maintain full control of encryption keys to comply with contractual requirements, regulatory mandates, or internal policies. Encrypting data prior to sending it to the cloud via a Hold Your Own Key (HYOK) concept is the only way to satisfy the more conservative trust models.

Safeguard Information
While Keeping
it Accessible

Some files need to be decrypted by anyone in the organization, whether the files were originally passphrase-encrypted or encrypted for specific recipients. No matter how they were encrypted, contingency keys can provide a safeguard to be sure that the organization’s important information does not risk becoming permanently inaccessible.

More Control
Over Secure Data

Software solutions that are highly usable can lack appropriate security, while deeply secure software solutions may feel too robust to be usable for most. Several software vendors have opened access to allow security to be directed by a third party, allowing Double Key Encryption opportunities to those better suited for providing security.

Why Choose PKWARE

icon

Automated
Processes

icon

Flexible, Policy-
Driven Action

icon

Cross-Platform
Operability

icon

Protect Data
Everywhere

icon

Comprehensive
Integrated
Capabilities

icon

Full
Administrative
Controls