Key Insight
Discover and visualize your cryptographic security posture
- Encryption key details such as algorithm type, creation date, rotation status, expiration, cloud tags, etc.
- Encryption details of S3, EBS, RDS, SQL, etc.
Assess the biggest security posture risks and compliance gaps
- Unencrypted services
- Shared keys
- Overly permissive keys and policies
- Long-lived keys
- Unused keys
- PQC readiness
- Many more...
Hybrid multicloud: On-premises, AWS, Azure
Federated authentication to integrate with IAM infrastructure
Protected by Confidential Computing
Data Security Manager
Enterprise Tier
Unified encryption key management across hybrid multicloud
- BYOK
- External KMS: Google EKM, AWS XKS
Integrated Hardware Security Modules (HSMs) with FIPS 140-2 L3 certification
REST API with OpenAPI to automate secure development
Wide ecosystem integrations
HSM gateway to modernize legacy HSM infrastructure
SaaS for easy consumption, or physical/virtual appliance
Policy-based enforcement with RBAC, Quorum controls, immutable logging
Data Masking and Tokenization
Secrets Management (credentials, certificates, etc.)
Certifications include FIPS 140-2 Level 3, PCI-DSS, ISO 27001, CIS and SOC-2 Type 2
Protected by Confidential Computing
Service Overview
Key Insight
30-days Free Trial
All Key Insight features are available for 30-days.
Description
Full feature set of Industry leading Fortanix Key Insight solution. Proactively manage data exposure risks with full visibility into all encryption keys and related data services across multicloud environments. Identify hidden risks and compliance gaps and future-proof your data security against the looming post-quantum threat
Click here to learn more about Key Insight
Data Security Manager Enterprise Tier
30-days Free Trial
All DSM SaaS services are available for 30-days.
Description
Full feature set of Industry leading Fortanix DSM SaaS platform. The DSM SaaS offers integrated data security service to protect privacy, compliance with regulations, enhanced security control, and better management and control of cryptographic keys. (All use-cases described in the Explorer offering are included)
Click here for DSM SaaS