Alternatives to Tencent Cloud Key Management Service

Compare Tencent Cloud Key Management Service alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Tencent Cloud Key Management Service in 2024. Compare features, ratings, user reviews, pricing, and more from Tencent Cloud Key Management Service competitors and alternatives in order to make an informed decision for your business.

  • 1
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 2
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
  • 3
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 4
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 5
    ARIA KMS

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server (KMS) application automatically manages the generation and distribution of encryption keys to handle all of the lifecycle requirements for key management. Highly scalable encryption key management with the ability to generate thousands of keys per minute, ARIA KMS is the ideal solution for per-data or per-application transactions. Delivers the flexibility to meet specialized encryption needs, such as software applications, hardened high availability appliances, or zero footprint PCIe adapters. Eliminates risk with automated configuration and management of KMS. Deploys encryption key management in one hour or less, with no specialized knowledge. Secures on-premises, cloud, or in-cloud deployments. Supports bring your own key (BYOK) security models.
  • 6
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 7
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 8
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 9
    KeyBank Touch

    KeyBank Touch

    Morse Watchmans

    Now get touchscreen convenience with KeyBank key access control system, the safer, more secure way to manage keys. The bright 7″ touchscreen key organizer system gives you an easier-to-use interface, and we made KeyBank Touch even more capable. The new KeyAnywhere feature enables you to return a key to any key storage system in your enterprise. You can also locate which KeyBank a specific key is in, or determine who has it out, with the new KeyFind feature. We’ve also improved integration capabilities, along with many other convenient features. Of course you still get our patented SmartKey system, modular design and full scalability. We just keep making key management better. Easy to read, large buttons for convenient navigation. Status bar shows guides users on what to do, and shows what is happening. Email notifications enable a tenant or owner to be alerted when a key to their residence is removed.
  • 10
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 11
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 12
    XCrypt Data Encryption Platform
    Customers worldwide choose Zettaset products for use in high performance, high availability and seamlessly scalable data environments. Zettaset products are designed to function with extremely low latency to support the most demanding deployment requirements, including high-speed transactions, in-memory databases, and real-time, web-based applications. The XCrypt™ Data Encryption Platform has been designed from the ground up for optimal performance and scalability in distributed systems and elastic cloud environments. XCrypt introduces extremely low latency to the compute environment, making it ideal for in-memory stored data and transactional environments where sub-second response times are essential.
  • 13
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 14
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 15
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 16
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 17
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 18
    KeyWin

    KeyWin

    Creone

    KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
  • 19
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 20
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 21
    Keyzapp

    Keyzapp

    Zapp Innovation

    Chasing after keys can waste hours each week, that’s why we built Keyzapp. Manage multiple sets of keys per property across multiple locations from any internet device. Customize our reusable smart fobs with your numbering and branding. Let automated text messages chase overdue keys for you. Smart fobs make it easy to identify and issue keys. Guided processes help everyone in the team stay consistent. Automated reminders ensure that that keys are returned before they are lost. Removes the chore of logging key custody on paper or in a database. Fits your process so it’s easy to adopt for everyone. Management information sheds light on your process, so you can manage and improve it. Look up where keys are with a couple of keystrokes. Simple, guided processes – minimal learning required. Access anytime, anywhere, from any device. Automated text messages chase up overdue keys. Easy to view & filter reports for insights on property access.
  • 22
    KeyNest

    KeyNest

    KeyNest

    KeyNest is a service that provides secure key exchange solutions for Airbnb hosts and property managers. KeyNest offers a KeyNest Points service, which makes handling keys to a property remotely a breeze. There are over 5,000 Points available, where you can store and exchange your keys with guests, contractors or friends. Here's how the KeyNest Points service works: Points: KeyNest operates a network of secure drop-off locations, often referred to as "KeyNest Points," which can include local businesses such as cafes, convenience stores, or other retail outlets. These locations serve as secure hubs where you can store and exchange your keys. Create a Booking: To use the KeyNest Points service, you need to log a key through the KeyNest website or app. This booking allows you to specify the key drop-off location and the details of your guests' arrival and departure. Secure Key Storage: Once you've made a booking, you'll securely store your keys and pass them to the guest.
    Starting Price: $12.99 AUD / key collection
  • 23
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 24
    SimpleK

    SimpleK

    ASSA ABLOY

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 25
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 26
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 27
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 28
    Seald

    Seald

    Seald

    Every industry has its own data security challenges: strengthening customer trust, achieving compliance, minimizing the consequences of a data breach, ... Seald addresses these challenges by offering to simply integrate end-to-end encryption into your applications. The privacy of your customers' data will be assured by design with Seald's certified technology, protecting them even in the event of a data breach. By using server-side encryption (including KMS, HSM or BYOK), the data is first transferred in its clear-text version and is then protected with encryption by the server. The servers therefore have access to a clear-text version of the data, which means that if compromised, the data would become vulnerable. By using Seald, data is secured on the client side, before being sent to the server. This way, neither Seald nor the cloud hosting company can decrypt the protected data, even if servers are compromised.
  • 29
    NuCypher

    NuCypher

    NuCypher

    Manage secrets such as IAM tokens, database and SSH credentials, and signing/encryption keys across dynamic environments. Conditionally grant and revoke access to sensitive data to arbitrary numbers of recipients. Process encrypted data while preserving the confidentiality of the inputs and results. NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols. NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes. Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data.
  • 30
    RemotePC

    RemotePC

    RemotePC

    Add unlimited users, organize them into groups and provide remote deployment, access controls, and more via the web console. Allow deployment for users and grant them permission to install RemotePC on other computers and access them remotely. Add computers, organize them into groups, and view the most recently accessed computers. Create new user accounts, organize them into groups, provide access permissions and more. Secure and instant access to any computer by entering a shared session code. Users can remotely access the computers assigned to them from anywhere, anytime. Reboot the remote computer in normal mode or safe mode (for Windows) from your RemotePC desktop application or web dashboard. Remote access is secure with TLSv 1.2/AES 256 encryption. Option to set unique Personal Key for computers, acts as a secondary password. Enable or disable permission for your users to transfer files between computers.
  • 31
    MITIGATOR
    MITIGATOR is an instrument against modern DDoS attacks at L3-L7 layers. It is designed to secure infrastructure and individual services of financial and gaming companies, telecom operators, hostings and enterprise.   MITIGATOR is an optimal choice for the companies acknowledging the issues in their security system and unsatisfied with the service provided by MSSP or their current DDoS protection tool. MITIGATOR features: -TCP protection of symmetric and asymmetric traffic  -TLS protection without traffic decryption -Web Server log analysis via syslog -Programmable filter usage; WAF integration options; application protection using Mitigator Challenge Response; ISN Synchronization -BGP support for traffic redirection. Can send and receive  BGP FlowSpec for traffic filtering -Flexible deployment schemes: Inline, On-a-stick, L2 transparency, L3 router -Geographically distributed clustering support  -Optional Flow Collector support -Automatic traffic dump collection
  • 32
    AWS Secrets Manager
    AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets with a call to Secrets Manager APIs, eliminating the need to hardcode sensitive information in plain text. Secrets Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon DocumentDB. Also, the service is extensible to other types of secrets, including API keys and OAuth tokens. In addition, Secrets Manager enables you to control access to secrets using fine-grained permissions and audit secret rotation centrally for resources in the AWS Cloud, third-party services, and on-premises. AWS Secrets Manager helps you meet your security and compliance requirements by enabling you to rotate secrets safely without the need for code deployments.
  • 33
    C2 Storage

    C2 Storage

    Synology C2

    Back up your Synology NAS data to the cloud with Hyper Backup or sync requested data between C2 Storage and branch offices using Hybrid Share. C2 Storage for Hyper Backup and Hybrid Share is designed to keep your NAS data protected and available at all times. From service consulting and technical support to hardware warranty, Synology is your only contact window. The budget further ahead with flexible monthly or yearly plans. There are no hidden fees or additional costs for data transfer or download. You only pay for cloud storage. Client-side AES-256 encryption protects your data from unauthorized access before it even leaves your NAS. To access your backups, a password-protected private key is used to keep anyone but yourself from decrypting, accessing, and modifying your data. Back up data from Synology NAS to C2 Storage, keeping secured, deduplicated, and version-controlled backups on the cloud.
  • 34
    IronCore Labs

    IronCore Labs

    IronCore Labs

    IronCore's SaaS Shield is a platform for managing Application-Layer Encryption in cloud software applications. It manages all of the concerns of such a system from key orchestration to rotation to audit trails. And it supports multi-tenant setups and BYOK/HYOK needs. Together with IronCore's other products, meaningfully protected data can still be usable and it can be searched over with Cloaked Search and Cloaked AI.
  • 35
    QiO Foresight Platform

    QiO Foresight Platform

    QiO Technologies

    Augmented analytical applications to predict and prescribe next course of action for performance, production, maintenance and energy. Configuration driven application services for user management, workflow, notifications, visualization and analytics. Support for any cloud provider: AWS, Microsoft Azure, Google and combination of deployments: public, private and edge. Full edge cloud deployment and management. Dynamic integration to any Industrial data source, any enterprise IT data sources and any sensors. Secure access control (machines and humans), data protection and encryption. ISO 27001 certified and externally validated by accredited agencies.
  • 36
    SecureZIP
    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement.
  • 37
    Weave GitOps Enterprise
    Weave GitOps Enterprise is a continuous operations product that makes it easy to deploy and manage Kubernetes clusters and applications at scale in any environment. The single management console automates trusted application delivery and secure infrastructure operations on premise, in the cloud, and at the edge. Managing a distributed fleet of Kubernetes clusters is a challenge that many organizations now face. Weave GitOps enables DevOps engineers to self-serve their cluster management requirements while staying within corporate standards. Weave GitOps provides a single dashboard for cluster management across multiple public cloud providers, in your data center or at the edge. Create new clusters or attach them to existing ones and observe cluster health status. Manage application lifecycle with GitOps and observe deployment status. Multi-tenant support with full roles-based access control (RBAC) that’s fully integrated with corporate IAM.
  • 38
    BackUp Maker

    BackUp Maker

    ASCOMP Software

    BackUp Maker automatically stores your files and at the same time offers an intuitive functionality. Select your data, optionally set automatization for scheduled backups, select its destination and within an instant, your valuable documents are transferred in zip format to a hard drive, USB flash drive or directly to the Cloud as scheduled or according to circumstances. To ensure that your sensitive data remains secure at all times, BackUp Maker provides a highly secured encryption of up to 256 bits (AES). It also enables you to transfer protected backups to a webserver through an FTP/FTPS upload. Security Features: You can limitlessly secure information using BackUp Maker. Back-up only new and changed files; generate as many backups as needed; split the backup across multiple data storage devices and carry out random operations before or after backups!
  • 39
    Tencent Container Registry
    Tencent Container Registry (TCR) offers secure, dedicated, and high-performance container image hosting and distribution service. You can create dedicated instances in multiple regions across the globe and pull container images from the nearest region to reduce pulling time and bandwidth costs. To guarantee data security, TCR features granular permission management and access control. It also supports P2P accelerated distribution to break through the performance bottleneck due to concurrent pulling of large images by large-scale clusters, helping you quickly expand and update businesses. You can customize image synchronization rules and triggers, and use TCR flexibly with your existing CI/CD workflow to quickly implement container DevOps. TCR instance adopts containerized deployment. You can dynamically adjust the service capability based on actual usage to manage sudden surges in business traffic.
  • 40
    Yandex Managed Service for MongoDB
    Get access to new MongoDB features and official releases that are 100% compatible with the platform. If the load on your cluster increases, you can add new servers or increase their capacity in a matter of minutes. Invest your time in your project, and we’ll take care of database maintenance: software backups, monitoring, fault tolerance, and updates. You can enable sharding for clusters that have MongoDB version 4.0 or higher. You can also add and configure individual shards to improve cluster performance. All DBMS connections are encrypted using the TLS protocol, and DB backups are GPG-encrypted. Data is secured in accordance with the requirements of local regulatory, GDPR, and ISO industry standards. MongoDB has no regular tables and stores data as collections of JSON-like documents. This is great for projects where data structures may change during development.
  • 41
    Yandex Managed Service for ClickHouse
    Invest your time in your project, and we’ll take care of database maintenance: software backups, monitoring, fault tolerance, and updates. ClickHouse is great at handling queries to large amounts of data in real time, while column-based storage saves space due to strong data compression. All DBMS connections are encrypted using the TLS protocol. Data is secured in accordance with the requirements of local regulatory, GDPR, and ISO industry standards. Visualize the data structure in your ClickHouse cluster and send SQL queries to databases from the management console. The service also provides data replication between database hosts (both inside and between availability zones) and automatically switches the load over to a backup replica in the event of a failure.
  • 42
    Switch Secure Workspace

    Switch Secure Workspace

    Egress Software Technologies

    Secure Workspace makes it easy for users to upload, control, and share documents securely with teammates and external partners. Our encrypted environment offers enterprise-grade access permissions at the click of a button. Our mobile app and productivity toolkit enable teams to collaborate seamlessly from anywhere. Detailed reporting helps you to demonstrate compliance and stay clear of burned reputations and regulatory fines. Secure Workspace lets you easily and securely share your most confidential data both internally and with your supply chain. Zones act as secure containers, making it easy for you to clearly organize content within folders and keep sensitive content safe from unauthorized access. With access permissions and controls, accredited security frameworks, and flexible authentication, your team can stay in control while sharing sensitive documents internally and with external partners.
  • 43
    DAtAnchor

    DAtAnchor

    DAtAnchor

    Anchor It™ for Absolute Data Security. In the old days sensitive data was protected with firewalls, shared drives, and a whole lot of user trust. Now the security is baked right into the data itself. Stop worrying about files being copied, shared, or stolen. Anchored files remain secure, access controlled, and auditable even after they've left your network. All without changing how users work. Sensitive data? Anchor it™. DAtAnchor Platform in a nutshell. Agents On Windows, iOS and Android. Provides Transparent Encryption with no change in existing workflows. Contextual Access & Dynamic Revocation. Monitors User Actions. SDKs On linux, macOS, iOS, Android & Raspberry Pi. Simple to integrate APIs. Functions to encrypt/decrypt any type of data. Integrates with AWS Lambda. Third-Party Sharing One-Click sharable link. Web based View, Edit and Download. Password and Time based links. App Integrations on Box and Egnyte platforms. Key Management Military Grade
  • 44
    ShardSecure

    ShardSecure

    ShardSecure

    We desensitize sensitive data in multi-cloud, hybrid-cloud, and private cloud environments while reducing management complexity and improving business continuity. Securely adopt the cloud without losing control of your data knowing your data is unintelligible and of no value to unauthorized users – anywhere it is stored. Backups are popular targets for attackers and ransomware. Improve your backup data resiliency and protect against attacks. We preserve the integrity of your microsharded data and roll back attempts at file tampering, including files encrypted by malware while your operations continue unaffected. Confidently address data privacy and security requirements to enable your data analysis projects. Secure your source code and other intellectual property from data breaches and supply chain attacks.
  • 45
    Voltage SecureData
    Secure sensitive data wherever it flows—on premises, in the cloud, and in big data analytic platforms. Voltage encryption delivers data privacy protection, neutralizes data breach, and drives business value through secure data use. Data protection builds customer trust and enables compliance to global regulations, including GDPR, CCPA, and HIPAA. Privacy regulations recommend encryption, pseudonymization, and anonymization to protect personal data. Voltage SecureData enables enterprises to de-identify sensitive structured data and support the use of data in its protect state to safely drive business value. Ensure that applications operate on secure data flowing through the enterprise with no gaps, no decryption, and no performance overhead. SecureData supports the broadest range of platforms and encrypts data in any language. Structured Data Manager integrates SecureData so that businesses can easily and continuously protect data throughout the lifecycle, from discovery to encryption.
  • 46
    DERO

    DERO

    DERO

    DERO is a general-purpose, private, and scalable decentralized application platform that allows developers to deploy powerful and unstoppable applications, while users retain total control over their assets with complete privacy. Account balances and data are never decrypted by the blockchain. Only account owners can decrypt and access their data. Welcome to a new data privacy paradigm. DERO has been developed from scratch in Golang and is being actively developed by the original developers. It is not a fork of any other coin. DERO is a homomorphically encrypted protocol that can serve individuals and businesses worldwide, with fast and anonymous transactions, smart contracts, and service models. The DERO Project has created a platform for developers to deploy secure, open, scalable, and privacy-preserving decentralized applications. DERO is unique because we value security and privacy above all else.
  • 47
    SendBig

    SendBig

    SendBig

    Share large files up to 30GB for Free. Dedicated German data centers & ISO Certified. We transfer and send large files online securely. To guarantee the safety and privacy of your data, we use SSL/TLS protocol (Secure Sockets Layer/Transport Layer Security). Files are stored in ISO 27001 certified data centers, an internationally recognized standard for information security. Sign up for Free to SendBig Pro to enjoy an amazing experience. End-to-end encryption, protect your files with password only know to you. End-to-end encryption, protect your files with password only know to you. Resend, forward or delete your uploaded files. We offer fast download and upload speeds. Defer sending time of your upload files, up to 3 days. Email notification when first download occurs.
  • 48
    R&S Trusted Gate

    R&S Trusted Gate

    Rohde & Schwarz Cybersecurity

    R&S®Trusted Gate – Secure Data Exchange provides secure exchanging of sensitive data between authorized partners. Data is automatically encrypted and can be securely synchronized from an internal network to all major online file sharing service. Customers can define deployment, encryption and authentication without relying on a third-party service provider. No confidential data will be exposed to a cloud storage provider or sharing service. Secure sharing of data with the R&S®Trusted Gate, Secure Data Exchange is simple and efficient. Customers can define the internal network folders that need to be shared with external partners. As soon as files will be stored in these folders, R&S®Trusted Gate is immediately syncing the confidential data to the defined external target. Data will be automatically encrypted. This solution is not only limited to office file types but it is applicable to almost all scenarios, e.g. server migration and backups.
  • 49
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 50
    ISPConfig

    ISPConfig

    ISPConfig

    Open Source, transparent, free, stable, secure und ultra-fast. Continuous development, huge documentation and big community with support forum with enterprise support. Manage one or more servers from one control panel. Single server, multiserver and mirrored clusters. No matter if physical server or virtual machine, ISPConfig just works. The ISPConfig support partner network offers a full range of support options for ISPConfig, email support, remote login and installation and consulting. Manage multiple servers from one control panel. Web server management for Apache2 and nginx. Mail server management with virtual mail users. DNS server management for BIND and PowerDNS. Virtualization (OpenVZ), administrator, reseller and client login. As the APS project is dead, we removed APS from our panel. HTTP/2 will be enabled for all websites if your software supports it. Implemented additional subdomain/alias vhost domains web folder checks.
    Starting Price: €5 one-time payment