IBM PureSystems Centre

Extending the value of IBM PureSystems

Alliance Key Manager for IBM PureFlex Systems

Townsend Security
IBM PureFlex System
Provided by:Townsend Security
Request Information

Easily and affordably meet encryption key management compliance requirements with Alliance Key Manager (AKM) for PureSystems™. AKM provides full life-cycle key management with any encryption library, as well as on-appliance encryption services so that your encryption key is always kept separate from the data it protects.
  • - Business Value

    Pattern Overview

    Certified. Comprehensive. Cost Effective.

    Alliance Key Manager is an encryption key management solution that creates, manages, and distributes 128, 192, and 256-bit AES keys for any application or database running on any Enterprise operating system. Alliance Key Manager also supports on-appliance encryption and decryption services.

    Enterprise Compatibility

    Works with all major business platforms, leading encryption applications, and legacy devices.

    Sample Client Binary and Source Applications

    Binary key retrieval and encryption libraries are provided for all major operating systems to enable rapid deployment of encryption key retrieval or on-device encryption applications. Sample source code is also provided for Java™, .NET (C#, VBNET, J#), C, RPG, and COBOL applications.

    Complete Audit Trail

    Built in logging allows administrators to track all key retrieval, key management, and system activity. Reports can be sent automatically to central log management, alerting facilities, or SIEM products for a timely and permanent record of activity.

    Key Access Control Addresses PCI-DSS Requirements

    Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated SSL/TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.

    Business Case

    Customers can meet a variety of regulatory compliance requirements to protect payment information, patient health information (PHI), and personally identifiable information (PII).

    Business Problem

    Enforce separation of duties and meet regulatory requirements. Secure the keys that safeguard your encrypted data. Automatically rotate encryption key to satisfy audit requirements.

  • -Technical Details

    Key sizes

    128-bit AES symmetric keys

    192-bit AES symmetric keys

    256-bit AES symmetric keys



    SSL/TLS authenticated secure communications

    GUI and Command Line console for key management

    Secure web application for server management

  • - More Information

    Provider Information

    Name: Luke Probasco


    Phone: 1-360-359-4400

PureSystems patterns are part of a broad portfolio of PureSystems solutions for business, cloud, and infrastructure applications.

See more solutions

Related tagged content



You must  login with your IBM ID to be able to bookmark. Select "Login" to bookmark or "Close" to return.