Protegrity Key Management
The Protegrity Data Security platform uses many keys to protect your sensitive data. The Protegrity Key Management solution manages the keys.
A Key Management solution that an enterprise selects must ensure that data encryption does not disrupt organizational functions. Key Management solutions must provide secure administration of keys through their life cycle. This includes generation, use, distribution, storage, recovery, rotation, termination, auditing, and archival.
The Protegrity Data Security platform uses many keys to protect your sensitive data. The Protegrity Key Management solution manages the keys.
The Key Management Web UI lets you initialize and manage the master keys, respository keys, data store keys, signing keys, and data element keys.
In the Protegrity Key Management, you can view information about keys, key stores, and manage the life cycle of different keys including key rotation.
Key Points be followed to leverage the best out of the Protegrity Key Management functionality.
A definition of terminologies related to the keys.