Azure Key Vault

Azure Key Vault

Microsoft
iSecurity Field Encryption

iSecurity Field Encryption

Raz-Lee Security
+
+

Related Products

  • Keeper Security
    1,734 Ratings
    Visit Website
  • 1Password
    16,155 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,393 Ratings
    Visit Website
  • Blockdaemon
    2 Ratings
    Visit Website
  • MongoDB Atlas
    1,644 Ratings
    Visit Website
  • Cerberus FTP Server
    159 Ratings
    Visit Website
  • Coinbase
    10 Ratings
    Visit Website
  • AnalyticsCreator
    46 Ratings
    Visit Website
  • Comet Backup
    215 Ratings
    Visit Website
  • Uniqkey
    178 Ratings
    Visit Website

About

Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.

About

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

People looking to safeguard cryptographic keys used by cloud apps and services

Audience

Companies that want to protect sensitive data using strong encryption

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Microsoft
Founded: 1975
United States
azure.microsoft.com/en-us/services/key-vault/

Company Information

Raz-Lee Security
Founded: 1983
United States
www.razlee.com/field-encryption/

Alternatives

Alternatives

iSecurity Anti-Ransomware

iSecurity Anti-Ransomware

Raz-Lee Security
Alliance Key Manager

Alliance Key Manager

Townsend Security
Halcyon.ai

Halcyon.ai

Halcyon
HashiCorp Vault

HashiCorp Vault

HashiCorp

Categories

Categories

Integrations

Activeeon ProActive
Azure Blob Storage
Azure Blockchain Workbench
Azure Confidential Computing
Azure Data Catalog
Azure DevTest Labs
Azure Marketplace
Centreon
CertSecure Manager
ContraForce
Devolutions Remote Desktop Manager
Doppler
IBM Unified Key Orchestrator
Jovu
Keycard
Microsoft Azure
Microsoft Purview
Protegrity
QSE
Salesforce Data Cloud

Integrations

Activeeon ProActive
Azure Blob Storage
Azure Blockchain Workbench
Azure Confidential Computing
Azure Data Catalog
Azure DevTest Labs
Azure Marketplace
Centreon
CertSecure Manager
ContraForce
Devolutions Remote Desktop Manager
Doppler
IBM Unified Key Orchestrator
Jovu
Keycard
Microsoft Azure
Microsoft Purview
Protegrity
QSE
Salesforce Data Cloud
Claim Azure Key Vault and update features and information
Claim Azure Key Vault and update features and information
Claim iSecurity Field Encryption and update features and information
Claim iSecurity Field Encryption and update features and information