Key Management

Our Key Management Services

Cogito is an experience Key Management service provider, and has been providing services such as secure key storage since its’ inception in 2011.

We can provide BYOK, HYOK and shared and dedicated services including dedicated hardware offerings. Our offerings are designed to reduce organisational costs and improve security posture.

Our Key Management Services allow organisations to: 

Avoid Vendor Lock-In

Vendor lock-in prevents migration from one cloud provider to another. Without a viable migration option, cloud customers become dependent on their service provider and any subsequent service changes. 

Enable Data Sovereignty

Data Sovereignty refers to when an organisations in one country sends and stores data in a separate geographical location. this can become a complex legal issue, particularly in reference to cloud-based service providers.

Reduce Cost

Costs assosciated with Key Management can rise upward into the millions. From training staff in niche skill areas, to setting up and adopting new systems. Cogito’s KMaaS services bring organisations cost-effective agility. 

Enable BYOK and HYOK

BYOK allows clients to use keys not related from their cloud services vendor. They can generate their own key, or use a third-party key provider. HYOK allows customers to keep their key in an on-premises service and manage all encryption and decryption with their own hardware.

Key Management Explained

Hackers aren’t looking to break your Encryption, they want to find your keys.

Keys are encryption tools, whenever data is encrypted a new key is created. Keys need to be protected to ensure the means to unlocking your data remains secret. 

Data encryption is classified in two types, symmetric and asymmetric. Each term refers to the respective number for keys used. Symmetric encryption uses one single key to encrypt and decrypt the data. In Asymmetric encryption, a public key encrypts data and a private key decrypts it. The public key can be freely distributed, however the private key must be kept very secure. 

Key Management is the procedure of protecting keys, this involves identifying who holds the keys; how they are generated; how they are distributed, and how they are rotated. 

How Can I Protect my Keys?

Key management requires careful planning and consideration. Aspects to consider when drafting a key management plan include, identifying who holds the keys, processes involved in rotation, generation, and how keys are protected in storage. Key must be handled carefully during their lifecycle to ensure they are not disclosed to inappropriate parties, modified, or substituted as this threatens unauthorised access to the encrypted data. Both sotrage software and hardware is available to store and protect keys. Cryptographic hardware modules offer more security than software security modules. Both TRSM (Tamper Resistant Security Module) and HSMs (Hardware Security Modules) are commonly used for the purposes of key storage and protection.

How Can I Protect my Keys?

Key management requires careful planning and consideration. Aspects to consider when drafting a key management plan include, identifying who holds the keys, processes involved in rotation, generation, and how keys are protected in storage. Key must be handled carefully during their lifecycle to ensure they are not disclosed to inappropriate parties, modified, or substituted as this threatens unauthorised access to the encrypted data. Both sotrage software and hardware is available to store and protect keys. Cryptographic hardware modules offer more security than software security modules. Both TRSM (Tamper Resistant Security Module) and HSMs (Hardware Security Modules) are commonly used for the purposes of key storage and protection.

Cogito’s Experience

Cogito has been offering Key Management services since 2011. We offer protection in a number of forms, including Hardware Security Modules, and has sold HSMs since inception. Our staff offer additional experience, with many decades worth of experience in Key Management and protection. Cogito experience includes the following products among others:

  • Safenet/Gemalto/Thales Luna, Key Secure and Vormetric product lines
  • nCipher (formerly Thales eSecurity) Connect, Solo and Edge series
  • Fortanix
  • Cavium
  • Ultra (Formerly AEP)
  • Utimaco
  • Blackbox
Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you