Features

Complex systems. Changing regulations. Countless keys.

One Plateform.

Our KMSAAS, a scalable, cloud-based
answer to your encryption key needs

A mere 9% of organizations in Europe have the ‘Mature’ level of readiness needed to be resilient against modern cyber risks.

Only 32% of European businesses have a cybersecurity strategy.

Eu

Introducing our KMSAAS

Empowering manufacturers in
the automotive industry & beyond.

Our services cover database encryption, digital rights management (DRM), public key infrastructure (PKI), cryptographic key protection, authentication & authorization, transaction processing & more.

  • Vehicle-to-everything

  • Supply chain data protection

  • Software updates

  • Production line digitalization

  • UN regulation No. 155/156

  • Connected car applications

Our expertise

Features fit for
your reality

Key security. KMS simplicity.

01

Key Generation

With the ability to generate short-lived certificates, device-specific keys & standard keys, our system protects your digital assets, including IoT devices & software subject to strict regulations & high risk.

  • AES 128/192/256

  • RSA 1024/2048/4096

  • Common elliptic curves

02

Digital Signature

Our code signing feature offers an added layer of security, verifying the authenticity of digital documents & transactions across any software, from simple mobile apps to OTA firmware updates.

  • HMAC & CMAC for AES 128/192/256

  • RSA PKCS1/PSS

  • Common elliptic curves

03

Encryption

Handle all of your encryption & decryption tasks through one integrated application, including the encryption of data used by other cloud services.

  • AES CBC/EBC/CTR

  • RSA PKCS1/OAEP

04

APIs

Flexible APIs allow our multipurpose cryptographic solution to integrate with & support your diverse & complex business use cases. Fundamental APIs can also be used as building blocks for more complex operations.

  • REST

  • PKCS #11

05

User Management

As the KMS administrator, easily add users & individualize security access. This can be done via the KMS or a dedicated identity provider.

  • Self-managed

  • AD Integrated

06

HSM & Database support

Keys&More KMS can be used with any HSM solution offering a PKCS #11 interface, though functionality may vary. The KMS has been tested with all major databases.

  • Databases: Oracle, Microsoft SQL server, MariaDB, MySQL, PostgreSQL

  • HSMs: FIPS 140-2 Level 3 HSM model from Utimaco & Thales

Keys&More DNA

Securing your operations

Integration

The heart of our KMSaas

The heart of our KMSaas

  • With existing IT infrastructure & connects to a range of applications & services thanks to a comprehensive API.

  • Directly into your workflows, whether to enhance the security of your cloud services, enterprise applications or custom-built solutions.

  • Advanced cryptographic features into your products & services.

Compatibility

Adaptive, flexible deployment

Adaptive, flexible deployment

  • With all major databases, allowing for easy deployment regardless of database preferences.

  • With numerous HSM providers, enabling access to key storage solutions that align with your security requirements & infrastructure.

  • With identity management services.

Centralization

Simplified management via integrated dashboard

Simplified management via integrated dashboard

  • Management of key lifecycles, ensuring that keys are properly updated, retired & replaced.

Transferability

Convenient key transfer mechanism

Convenient key transfer mechanism

  • Exportable keys between Keys&More KMS & most commercial HSMs using RSA key wrapping, safely delivering keys to other systems without sacrificing data confidentiality.

Contact

Connect with our experts.

Take the first step towards a more secure future.
Reach out to us today to explore how Keys&More solution
can enhance your existing security practices.

Send
an email

Publications

White Paper 2024

Ask to get it

Publications

Cybersecurity, Encryption & the Internet of Vulnerable Things

Read it

Publications

KMS as a Path to Compliance for OEMs

Read it

Publications

Embracing New Technology Without Sacrificing Security

Read it

Publications

A 360° Approach to KMS

Read it

Keys&More
by Incert

About us

More about
Incert