Rantronics Logo

Randtronics DPM easyKey

Lifecycle key management, centralized, cross-platform - made easy

DPM easyKey diagram illustrating optional management of Hardware Security Modules

Enterprise Key Management

Organizations getting serious about implementing encryption can quickly find the administrative exercise of managing thousands of keys across multiple platforms to be resource-intensive and prone to error.

As the bedrock for any robust encryption system, getting key management right, everytime and across every system is essential for ensuring data is both available and secure.

Randtronics DPM easyKey is a highly secure 100% software key management application providing policy-based key and certificate management with the option to support multi-vendor HSM clusters or CloudHSM.

DPM easyKey offers policy-controlled, full-lifecycle management for encryption keys and digital certificates.

Basic key management functions are simplified and standardized through templates and policy automation.

Key Lifecycle (create, rotate, revoke, destroy):

  • Generation 
  • Distribution  
  • Storage 
  • Backup/ Recovery 
  • Revocation
  • Destruction
Audit logging captures details of all key management and usage activities 
Key Lifecycle diagram: Key Rotation, Access Control & Audit Logging, Storage, Generation, Distribution, Backup/Recovery, Revocation, Destruction
More information:

DPM easyKey manages all encryption keys and digital certificates.

  • Key Administrators access DPM easyKey via its web browser-based interface.
  • KMIP 1.1 compliant, RESTful API provides encryption key services to client applications.
  • Encryption keys are either generated and protected internally on the DPM easyKey, or an HSM if optionally installed.
  • Integrates with HSM clusters or cloudHSM for hardware key generation
  • Provides no-code integration, key management services for DPM easyCipher and DPM easyData 
  • Supports all symmetric and asymmetric keys
  • Access Control for users and clients
  • Dual Control: can be configured to require that 2 people log on to activate, thus providing dual control for significant operations.
  • High-level key assurance via hardware to FIPS 140-2/3 Level 3/4 and Common Criteria EAL4+/5+.   Support for multivendor HSM including products supporting quantum-ring generation.
  • Separation of Duties – isolate key management responsibility in compliance with best practice recommendations.
  • Enforcement of TLS or SSL connection for key distribution
  • Audit logging of all key management and usage activities

Supported backend databases:

  • Microsoft SQL Server 2019 and up
  • Oracle MySQL 5.7 and 8.0

 

Supported environments:

  • Windows Server 2019 and up
  • RedHat Linux, CentOS, Oracle Linux, Ubuntu
 

Supported client interfaces:

  • File encryption key connectors for Windows and Linux based file servers and Laptops
  • APIs using RESTful, SOAP, web services
  • Database connector for databases MS SQL Server and Oracle
  • Multi-vendor HSMs (Utimaco, Entrust, Thales, Fortanix, Securosys and Engage) and Microsoft Azure key vault
  • KMIP supported enterprise key manager

Utimaco Security Server case study  – click here to view.

Fortanix SDKMS case study – click here to view.

nCipher HSM case study  – click here to view.

Securosys HSM case study  – click here to view.

Engage Black HSM case study  – click here to view.

Entrust nShield HSM case study – click here to view

Randtronics DPM suite datasheet – click here to view

To request a demonstration, please email enquiry@randtronics.com

Latest news and articles

Goodbye, Tina Turner

Sad news this week that the Queen of Rock ‘n’ Roll has exited the stage. Many of us at the Randtronics team grew up hearing

Read More

Our Customers

Letter from the CEO

Rantronics Logo

Thank you for visiting the Randtronics website.

We make enterprise encryption easy.

Smart businesses already know that only encryption can reduce the attack surface and stop the hackers from stealing their sensitive data. A company that only uses encryption is more secure than a company with all other cyber security measures. Privacy standards such as PCI DSS, HIPAA, and GDPR are all mandating in law the protection of the citizen’s personal data. Fines for breaches are huge. You won’t get fined if your firewall is hacked. You won’t get fined if you suffer a virus or ransomware attack. You WILL get fined if you lose ANY personal data pertaining to ANY citizen. The lowest common denominator is the DATA. Data that is “Encrypted” is out of the scope of the Law.

Whilst all understand the need to protect sensitive data holistically (such as NIST Cyber Security Framework or 12 prescriptive PCI DSS guidelines) their cyber security priorities are misguided to say easy aspects and not addressing “what happens” when these fail? Encryption of data is the only direct protection measure that renders data unreadable compared to upgrading firewalls or virus and malware, IPS, log monitoring, etc. I am saying you need all methods but unless you have implemented enterprise grade encryption you are still unprotected like driving a car without “seatbelts”. “Enterprise grade encryption” as a cyber measure is the “seat belt” that saves lives in car accidents. Industry experts predict a relentless continuation of data breaches this year and penetration testing have proven perimeter defense is easily penetrable.

Randtronics has taken the challenge to make encryption easy and is innovating in many areas. We have already reduced deployment effort to days, use familiar standard components so that less skilled people can deploy and maintain systems.
I welcome discussions via email or phone as through your feedback we will be challenged to continue to innovate to the point where businesses and users do not need to be intimidated when using encryption as the worlds most powerful tool to protect their sensitive data.

Experts predict data breaches will continue at relentless pace, let Randtronics secure your business with “Enterprise grade ubiquitous encryption technology”. Time is of the essence. Why not be pro-active? I invite you to let Randtronics and its global distributors and resellers assess and assist your business directly.

Yours sincerely,
Bob K Adhar, BE, MBA, CISSP
Founder and CEO