Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Transparent Data Encryption for all Editions (Express to Enterprise) of SQL Server. No programming required. Developer friendly: can be easily bundled with SQL Server-based applications. An economical alternative to upgrading from SQL Server Enterprise. Assists in compliance with various regulations. Protects intellectual property and data.

Description

For nearly two decades, StrongKey has been a key player in the PKI sector, with installations around the world in a variety of fields. The StrongKey Tellaro platform delivers a complete public key infrastructure (PKI) solution for overseeing keys and digital certificates. Equipped with an integrated hardware security module (HSM) and EJBCA server, clients can issue digital certificates using our Tellaro E-Series, which is based on securely produced public keys. The generation and storage of private keys occur within the HSM for enhanced security. Our PKI management system seamlessly integrates with TLS/SSL protocols, identity access management (IAM), digital signatures, secrets management, and device management frameworks. In addition to being a robust software suite that facilitates strong authentication, encryption, tokenization, PKI management, and digital signature oversight, StrongKey Tellaro also features open-source components, including a FIDO® Certified FIDO2 server. Furthermore, we offer adaptable deployment options that cater to both data center and cloud environments, ensuring that our customers have the flexibility they need.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

NetLib Security

Founded

1997

Country

United States

Website

netlibsecurity.com

Vendor Details

Company Name

StrongKey

Founded

2001

Country

United States

Website

www.strongkey.com/pki-key-and-certificate-management

Product Features

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

NoSQL Database

Auto-sharding
Automatic Database Replication
Data Model Flexibility
Deployment Flexibility
Dynamic Schemas
Integrated Caching
Multi-Model
Performance Management
Security Management

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

SQL Server

CPU Monitoring
Credential Management
Database Servers
Deployment Testing
Docker Compatible Containers
Event Logs
History Tracking
Patch Management
Scheduling
Supports Database Clones
User Activity Monitoring
Virtual Machine Monitoring

Product Features

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Alternatives

Sealit Reviews

Sealit

Sealit Technologies
EncryptRIGHT Reviews

EncryptRIGHT

Prime Factors
Secardeo TOPKI Reviews

Secardeo TOPKI

Secardeo