Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
IBM Guardium Key Lifecycle Manager streamlines the encryption key management process, enhancing security for encrypted data while making key management more straightforward and automated. This solution provides a secure and powerful means of key storage, serving, and lifecycle management tailored for self-encrypting applications, utilizing interoperability protocols such as KMIP, IPP, and REST. By implementing Guardium Key Lifecycle Manager, organizations can more effectively comply with various regulations like PCI DSS, Sarbanes-Oxley, and HIPAA, as it includes essential features such as access control and automated key rotation. The system ensures centralized, transparent, and simplified key management through the secure handling of key material and on-demand key serving. It facilitates seamless integration with supported protocols, which enhances its functionality significantly. Additionally, the automation of key assignment and rotation not only increases security but also helps in minimizing the overall costs associated with key management. Overall, Guardium Key Lifecycle Manager represents a comprehensive solution for organizations looking to enhance their encryption practices while maintaining regulatory compliance.
Description
Trellix offers Data Encryption solutions that protect devices and removable storage to guarantee that only authorized personnel can access the stored data. You can implement encryption policies from one management dashboard, which also allows for monitoring the encryption status and producing compliance documentation.
Select from a wide array of policy choices to safeguard data across various devices, files, and removable media, all efficiently overseen from a single platform.
With Trellix Native Drive Encryption, the management of both BitLocker and FileVault is centralized, streamlining operations into one accessible console that can be utilized on-premises or through SaaS. This approach not only conserves time but also optimizes resources for organizations dealing with various operating systems, as tasks such as encryption key and PIN management are consolidated in one place, enhancing overall efficiency. Additionally, this centralized system aids in maintaining a consistent security posture across the organization.
API Access
Has API
API Access
Has API
Integrations
AD Enterprise
AD Lab
AT&T Alien Labs Open Threat Exchange
AirShield
BeyondCorp Enterprise
Cyble
Datacard Secura
Entrust Identity Enterprise
Intellego XT
Ionic Machina
Integrations
AD Enterprise
AD Lab
AT&T Alien Labs Open Threat Exchange
AirShield
BeyondCorp Enterprise
Cyble
Datacard Secura
Entrust Identity Enterprise
Intellego XT
Ionic Machina
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/guardium-key-lifecycle-manager
Vendor Details
Company Name
Trellix
Founded
2022
Country
United States
Website
www.trellix.com/products/data-encryption/
Product Features
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Product Features
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking