The management of encryption keys is becoming increasingly important for the safety of the company.
Over time, more and more encryption keys for secure terminal connections or tunneled applications are created and remain for many years on servers. Employees come and go, applications are changed, there are many reasons why old key material remains unused on the servers. This poses a security threat, because attackers can make this key material used, e.g. to be sent by encrypted remote terminal connection to connect to a server. These connections are not recognized, because the key is used by anyone.
For this we offer following security solution:
- Identify and catalog the existing key material on all servers
- Management of existing keys of associated applications and users
- Blocking, creation and replacement of existing keys
- Monitoring and reporting