Protect your customers, your reputation, and your most sensitive data from both external and internal threats with the TrustedKeep™ Platform.
Scalable Object-Level Encryption
Encrypt every object with a unique key. A single TrustedKMS™ cluster scales to billions of keys under management, and handles thousands of transactions per second.
Strong Access Control and Separation of Duties
End users and authorized systems only have access to the data they're supposed to see. Your TrustedGateway™ administrators make access control decisions, but have no access to data. Your TrustedKMS™ administrators manage the TrustedKMS™ cluster, but make no access control decisions, and have no access to data. Your encryption keys never leave the TrustedKeep™ security boundary.
Strong Auditing and Monitoring
Every operation is audited, and all audit is exportable to your elastic™ stack. Notifications can be generated on the fly as objects are stored, retrieved, and deleted.
API Compatible With Amazon's Simple Storage Service (S3)
TrustedKeep™ acts as a transparent proxy to S3. You can rely on TrustedKeep™ to encrypt each object you store with one or more unique keys, while knowing that your cloud provider does not have access to those object-level keys or your master keys.
Compatible with Amazon's KMS
For your most sensitive workloads, encrypt your data with TrustedKeep™ and a Customer Managed Key (CMK) from Amazon's KMS.
Highly Available and Geographically Distributable
TrustedGateway™ is stateless and can scale to your workload, while TrustedKMS™ can be distributed across data centers or AWS regions. All operations are consistent within a datacenter or region, and eventually consistent across datacenter / region boundaries.
A data breach at DISA between May and July 2019 may have revealed Social Security numbers and other Personally Identifiable Information (PII).
- Reuters, February 20, 2020
According to a 2019 study by SecurityIntelligence, the average global cost of a data breach from 2018-2019 is $3.92 million. And according to that same study, the most significant cost reduction in a breach comes from extensive use of encryption.
The TrustedKeep™ platform is a response to the need for better information security practices both in the cloud and in your data center. Developed by Trusted Concepts™ based on years of experience developing hardened solutions to protect our customers' most valuable data, TrustedKeep™ is secure, scalable, and simple to deploy.