Alliance Key Manager for IBM PureFlex Systems
IBM PureFlex System
|Provided by: Townsend Security|
Easily and affordably meet encryption key management compliance requirements with Alliance Key Manager (AKM) for PureSystems™. AKM provides full life-cycle key management with any encryption library, as well as on-appliance encryption services so that your encryption key is always kept separate from the data it protects.
Certified. Comprehensive. Cost Effective.
Alliance Key Manager is an encryption key management solution that creates, manages, and distributes 128, 192, and 256-bit AES keys for any application or database running on any Enterprise operating system. Alliance Key Manager also supports on-appliance encryption and decryption services.
Works with all major business platforms, leading encryption applications, and legacy devices.
Sample Client Binary and Source Applications
Binary key retrieval and encryption libraries are provided for all major operating systems to enable rapid deployment of encryption key retrieval or on-device encryption applications. Sample source code is also provided for Java™, .NET (C#, VBNET, J#), C, RPG, and COBOL applications.
Complete Audit Trail
Built in logging allows administrators to track all key retrieval, key management, and system activity. Reports can be sent automatically to central log management, alerting facilities, or SIEM products for a timely and permanent record of activity.
Key Access Control Addresses PCI-DSS Requirements
Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated SSL/TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
Business CaseCustomers can meet a variety of regulatory compliance requirements to protect payment information, patient health information (PHI), and personally identifiable information (PII).
Business ProblemEnforce separation of duties and meet regulatory requirements. Secure the keys that safeguard your encrypted data. Automatically rotate encryption key to satisfy audit requirements.
128-bit AES symmetric keys
192-bit AES symmetric keys
256-bit AES symmetric keys
SSL/TLS authenticated secure communications
GUI and Command Line console for key management
Secure web application for server management
Provider name: Luke Probasco