Best Software for 2025 is now live!
|| products.size

Best Encryption Key Management Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. IT and security professionals use these solutions to ensure access to highly sensitive information remains secured.

Encryption key management software also provides tools to protect the keys in storage, as well as backup functionality to prevent data loss. Additionally, encryption key management software includes functionality to securely distribute keys to approved parties and enforce policies related to key sharing.

Certain general encryption software provide key management capabilities. Still, those solutions will only provide limited features for key management, distribution, and policy enforcement.

To qualify for inclusion in the Encryption Key Management category, a product must:

Provide compliance management capabilities for encryption keys
Include key storage and backup functionality
Enforce security policies related to key storage and distribution

Best Encryption Key Management Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
67 Listings in Encryption Key Management Available
(40)4.7 out of 5
6th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and m

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 55% Small-Business
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenSSH features and usability ratings that predict user satisfaction
    9.6
    Regional Support
    Average: 8.6
    8.8
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenBSD
    Year Founded
    1995
    HQ Location
    Alberta, Canada
    Twitter
    @OpenBSD_CVS
    502 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and m

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 55% Small-Business
  • 23% Enterprise
OpenSSH features and usability ratings that predict user satisfaction
9.6
Regional Support
Average: 8.6
8.8
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.8
Ease of Use
Average: 8.8
Seller Details
Seller
OpenBSD
Year Founded
1995
HQ Location
Alberta, Canada
Twitter
@OpenBSD_CVS
502 Twitter followers
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 45% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureKey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    2
    Convenience
    1
    Customer Support
    1
    Privacy
    1
    Cons
    Difficult Learning Process
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Toronto, ON
    Twitter
    @SecureKey
    2,658 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 45% Small-Business
  • 31% Mid-Market
SecureKey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
2
Convenience
1
Customer Support
1
Privacy
1
Cons
Difficult Learning Process
1
Expensive
1
SecureKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.1
Ease of Use
Average: 8.8
Seller Details
Year Founded
2008
HQ Location
Toronto, ON
Twitter
@SecureKey
2,658 Twitter followers
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(11)4.2 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GnuPG features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.1
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GnuPG
    HQ Location
    N/A
Product Description
How are these determined?Information
This description is provided by the seller.

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 36% Small-Business
GnuPG features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.1
Ease of Use
Average: 8.8
Seller Details
Seller
GnuPG
HQ Location
N/A
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 70% Enterprise
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vormetric Data Security Platform features and usability ratings that predict user satisfaction
    9.0
    Regional Support
    Average: 8.6
    9.3
    Scalability
    Average: 8.7
    9.7
    API/Integrations
    Average: 8.5
    7.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,830 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    666 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

Users
No information available
Industries
No information available
Market Segment
  • 70% Enterprise
  • 20% Mid-Market
Vormetric Data Security Platform features and usability ratings that predict user satisfaction
9.0
Regional Support
Average: 8.6
9.3
Scalability
Average: 8.7
9.7
API/Integrations
Average: 8.5
7.6
Ease of Use
Average: 8.8
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,830 Twitter followers
LinkedIn® Page
www.linkedin.com
666 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management sol

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 29% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alliance Key Manager features and usability ratings that predict user satisfaction
    7.5
    Regional Support
    Average: 8.6
    8.1
    Scalability
    Average: 8.7
    7.8
    API/Integrations
    Average: 8.5
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Olympia, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management sol

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 29% Small-Business
Alliance Key Manager features and usability ratings that predict user satisfaction
7.5
Regional Support
Average: 8.6
8.1
Scalability
Average: 8.7
7.8
API/Integrations
Average: 8.5
8.6
Ease of Use
Average: 8.8
Seller Details
HQ Location
Olympia, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(6)4.4 out of 5
View top Consulting Services for Google Cloud HSM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 cer

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud HSM features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.6
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,553,933 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    301,875 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud HSM is a cloud-hosted hardware security module (HSM) service on Google Cloud Platform. With Cloud HSM, you can host encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 cer

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Google Cloud HSM features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.6
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,553,933 Twitter followers
LinkedIn® Page
www.linkedin.com
301,875 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeyScaler features and usability ratings that predict user satisfaction
    9.2
    Regional Support
    Average: 8.6
    9.2
    Scalability
    Average: 8.7
    9.2
    API/Integrations
    Average: 8.5
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Reading, Berkshire
    Twitter
    @DeviceAuthority
    2,672 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 38% Small-Business
KeyScaler features and usability ratings that predict user satisfaction
9.2
Regional Support
Average: 8.6
9.2
Scalability
Average: 8.7
9.2
API/Integrations
Average: 8.5
9.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2014
HQ Location
Reading, Berkshire
Twitter
@DeviceAuthority
2,672 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Key Lifecycle Manager features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    6.7
    API/Integrations
    Average: 8.5
    7.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    711,096 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
IBM Guardium Key Lifecycle Manager features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
6.7
API/Integrations
Average: 8.5
7.5
Ease of Use
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
711,096 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales Data Protection on Demand features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,830 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    666 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Thales Data Protection on Demand features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.8
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,830 Twitter followers
LinkedIn® Page
www.linkedin.com
666 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • iSecurity Field Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Encryption Security
    2
    Affordable
    1
    Customer Support
    1
    Data Protection
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity Field Encryption features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    503 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting complianc

Users
No information available
Industries
No information available
Market Segment
  • 73% Enterprise
  • 18% Small-Business
iSecurity Field Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Encryption Security
2
Affordable
1
Customer Support
1
Data Protection
1
Cons
Slow Performance
1
iSecurity Field Encryption features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
503 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged credentials are some of the highest-value targets for cybercriminals. Keeper Secrets Manager is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets s

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Small-Business
    • 13% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Secrets Manager features and usability ratings that predict user satisfaction
    7.8
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    9.4
    API/Integrations
    Average: 8.5
    9.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,994 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    437 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged credentials are some of the highest-value targets for cybercriminals. Keeper Secrets Manager is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets s

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Small-Business
  • 13% Enterprise
Keeper Secrets Manager features and usability ratings that predict user satisfaction
7.8
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
9.4
API/Integrations
Average: 8.5
9.4
Ease of Use
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,994 Twitter followers
LinkedIn® Page
www.linkedin.com
437 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    3.3
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    418 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
3.3
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,655 Twitter followers
LinkedIn® Page
www.linkedin.com
418 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ONTAP Data Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Data Protection
    2
    Data Security
    2
    Encryption
    2
    Malware Protection
    2
    Cons
    Complexity
    3
    Complexity Issues
    2
    Expensive
    2
    Complex Configuration
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ONTAP Data Security features and usability ratings that predict user satisfaction
    9.2
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    8.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetApp
    Year Founded
    1992
    HQ Location
    Sunnyvale, California
    Twitter
    @NetApp
    121,327 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,942 employees on LinkedIn®
    Ownership
    NASDAQ
Product Description
How are these determined?Information
This description is provided by the seller.

Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
ONTAP Data Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Data Protection
2
Data Security
2
Encryption
2
Malware Protection
2
Cons
Complexity
3
Complexity Issues
2
Expensive
2
Complex Configuration
1
Complex Setup
1
ONTAP Data Security features and usability ratings that predict user satisfaction
9.2
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
8.3
Ease of Use
Average: 8.8
Seller Details
Seller
NetApp
Year Founded
1992
HQ Location
Sunnyvale, California
Twitter
@NetApp
121,327 Twitter followers
LinkedIn® Page
www.linkedin.com
12,942 employees on LinkedIn®
Ownership
NASDAQ
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ubiq Encryption Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Efficiency
    2
    Automation
    1
    Customer Support
    1
    Encryption Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ubiq Encryption Platform features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Ubiq Encryption Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Efficiency
2
Automation
1
Customer Support
1
Encryption Security
1
Cons
This product has not yet received any negative sentiments.
Ubiq Encryption Platform features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alibaba Key Management Service features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alibaba
    HQ Location
    Hangzhou
    Twitter
    @alibaba_cloud
    1,065,414 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,465 employees on LinkedIn®
    Ownership
    BABA
    Total Revenue (USD mm)
    $509,711
Product Description
How are these determined?Information
This description is provided by the seller.

Alibaba Cloud Key Management Service (KMS) is a secure and easy-to-use service to create, control, and manage encryption keys used to secure your data

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Alibaba Key Management Service features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Alibaba
HQ Location
Hangzhou
Twitter
@alibaba_cloud
1,065,414 Twitter followers
LinkedIn® Page
www.linkedin.com
4,465 employees on LinkedIn®
Ownership
BABA
Total Revenue (USD mm)
$509,711