Key Management

A general overview of Key Management to explain its importance and impact on Protegrity products.

A Key Management solution that an enterprise selects must ensure that data encryption does not disrupt organizational functions. Key Management solutions must provide secure administration of keys through their life cycle. This includes generation, use, distribution, storage, recovery, rotation, termination, auditing, and archival.


Protegrity Key Management

The Protegrity Data Security platform uses many keys to protect your sensitive data. The Protegrity Key Management solution manages the keys.

Key Management Web UI

The Key Management Web UI lets you initialize and manage the master keys, respository keys, data store keys, signing keys, and data element keys.

Working with Keys

In the Protegrity Key Management, you can view information about keys, key stores, and manage the life cycle of different keys including key rotation.

Key Points for Key Management

Key Points be followed to leverage the best out of the Protegrity Key Management functionality.

Keys-Related Terminology

A definition of terminologies related to the keys.

Last modified : January 31, 2025