Enterprise Key Management
Pure-software key management
Please Call for Pricing!
vHSM for all your critical applications
- Document Signing
- SSL Certificates
- Code Signing
- App-Level Encryption
- Database Encryption
- Certificate Authority
- PKI Infrastructure
- VPN Gateways
vHSM lets you maintain full control of your private keys in public cloud environments. No one, not even the cloud provider, has access to your keys. Supports all types of standard cryptographic keys for all purposes.
vHSM lets you achieve scalable, elastic and flexible key lifecycle management in virtualized and non-virtualized environments without sacrificing the strong security guarantees offered in physical HSMs.
vHSM supports hybrid topologies to allow even higher segregation between key shares. This allows you to store one key share on the cloud and the other inside the enterprise, or alternatively a key could be shared between two different cloud providers.
Clear and Proven Security Guarantee
At the core of Dyadic’s pure-software key management system is the Dyadic vHSM. Dyadic vHSM has a mathematical guarantee of security, backed by a rigorous security proof. Dyadic vHSM does not rely on obfuscation algorithms, whitebox cryptography or security-by-obscurity techniques. At Dyadic’s core are mathematically proven algorithms based on Multiparty Computation (MPC) which allow hardware-grade key security to be achieved through a pure software solution.
Secured Management Features
Dyadic vHSM allows you to customize granular admin authorization and access management rules. Firstly, Dyadic’s M-of-N Control policy allows you define a minimum number of admins (M) out of a total number of admins (N) who must work together to perform the high-security operations that you define. Secondly, you may also add another layer of access security in the application level in addition to the primary layer of server authorization.
Elastic and Easily Scalable Enterprise Key Management
Dyadic vHSM provides a truly scalable, elastic and flexible key management platform for both virtualized and non-virtualized environments. While delivering security guarantees comparable to physical HSMs, Dyadic vHSM is favored for its unmatched usability. As a software-only product, vHSM requires minimal efforts to setup, use and maintain and allows you to meet even the strictest high-availability requirements.
Transparent and Seamless Integration
vHSM can be deployed easily without disrupting the existing workflow of applications. Dyadic supports full key lifecycle management including partitioning, BYOK (Bring Your Own Key), generation, renewal, archiving and revocation of all types of standard cryptographic keys: RSA and ECC keys for all purposes – encryption/decryption, digital signing and authentication. Dyadic vHSM is fully transparent to the calling application and supports all crypto API’s such as KMIP, PKCS#11, Microsoft CNG, OpenSSL engine and Dyadic SDK for .NET, Java, Python and PHP.
Dyadic’s advanced content-based auditing tools gives you the full details of every decrypt or signing operation for every time a key is used. Logs include: what type of operation, the date and time of the operation; the servers from which the request was made; and the users that authorized the operation. Audit logs can be viewed from the Dyadic vHSM console or exported to a third party tool such as a SIEM.
Please Call for Pricing!