Best Encryption Key Management Software for AWS Marketplace

Compare the Top Encryption Key Management Software that integrates with AWS Marketplace as of October 2025

This a list of Encryption Key Management software that integrates with AWS Marketplace. Use the filters on the left to add additional filters for products that have integrations with AWS Marketplace. View the products that work with AWS Marketplace in the table below.

What is Encryption Key Management Software for AWS Marketplace?

Encryption key management software securely handles the creation, storage, distribution, and lifecycle management of encryption keys used to protect sensitive data. It provides a centralized system that ensures only authorized users and applications can access or decrypt encrypted information, reducing the risk of data breaches. By automating key processes such as generation, rotation, expiration, and backup, this software helps maintain security standards and compliance with regulatory requirements. With features like role-based access, logging, and auditing, it offers transparency and control over key usage. Encryption key management is essential for organizations aiming to secure data across databases, applications, and cloud environments. Compare and read user reviews of the best Encryption Key Management software for AWS Marketplace currently available using the table below. This list is updated regularly.

  • 1
    OpenSSH

    OpenSSH

    OpenSSH

    OpenSSH is the premier connectivity tool for remote login with the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks. In addition, OpenSSH provides a large suite of secure tunneling capabilities, several authentication methods, and sophisticated configuration options. Remote operations are done using ssh, scp, and sftp. Key management with ssh-add, ssh-keysign, ssh-keyscan, and ssh-keygen. The service side consists of sshd, sftp-server, and ssh-agent. OpenSSH is developed by a few developers of the OpenBSD project and made available under a BSD-style license. OpenSSH is incorporated into many commercial products, but very few of those companies assist OpenSSH with funding. Contributions towards OpenSSH can be sent to the OpenBSD Foundation. Since telnet and rlogin are insecure, all operating systems should ship with support for the SSH protocol included. The SSH protocol is available in two incompatible varieties, SSH 1 and SSH 2.
    Starting Price: Free
  • 2
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • Previous
  • You're on page 1
  • Next