Easily migrate from Dell Enterprise Key Manager to IBM Security Key Lifecycle Manager. IBM® Security Key Lifecycle Manager for Dell Migration Customers centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs. It offers robust key storage, serving and lifecycle management for IBM and non-IBM storage devices. Customers who are currently using Dell Encryption Key Manager can easily migrate to IBM Security Key Lifecycle Manager for Dell Migration Customers.
IBM Security Key Lifecycle Manager helps meet regulations and standards such as the Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley and the Health Insurance Portability and Accountability Act (HIPAA). In addition to supporting the protocols used to support tape systems, IBM Security Key Lifecycle Manager for Dell Migration Customers also supports the OASIS Key Management protocol (KMIP), so your investment can be leveraged by integrating with self-encrypting disk and tape systems.
You can start the migration process from Dell Encryption Key Manager to IBM Security Key Lifecycle Manager for Dell Migration Customers quickly by purchasing one copy of IBM Security Key Lifecycle Manager Basic Edition and one Tape Client Device Entitlement for each tape drive that you need to integrate with IBM Security Key Lifecycle Manager. An IBM sales representative is available to help identify the number of licenses you need for your configuration.
IBM Security Key Lifecycle Manager for Dell Migration Customers:
- Provides more efficient, simplified, consolidated and transparent key management through centralized storage of key material in a location designed for security and serves keys at the time of use
- Offers simple, secure integration between Dell™ PowerVault™ tape libraries and IBM Security Key Lifecycle Manager, which provides strong protection of data and encryption keys
- Reduces key management costs by automating the assignment of keys and rotation of keys
- Helps address regulations such as PCI-DSS, which call for strong protection of encryption keys
- Reduces operating costs, speeds implementation and enables interoperability with wizard-based assistance that guides administrators through a series of simple, task-based screens
Provides more efficient, simplified, consolidated and transparent key management
- Manages the lifecycle of keys by automating the creation, import, distribution and backing up of keys
- Enables keys to be generated and served from a centralized location
- Groups devices into separate domains and allows multiple administrators with different roles and permissions to be defined
- Integrates centralized directory servers for role-based access control
Offers simple secure integration between Dell™ PowerVault™ tape libraries and IBM Security Key Lifecycle Manager
- Designed to provide cryptographically proven, end-to-end security for key serving
- Keys are never readable outside of the encryption hardware and keys are only delivered to known devices
- Provides automated replication for high-availability deployments
- Although the Dell tape libraries do not support the Federal Information Processing Standard (FIPS) 140-2 standard, IBM Security Key Lifecycle Manager does support FIPS 140-2 Level 1 and offers users the option to use FIPS 140-2 Level 3 validated hardware security modules to enhance key security
Reduces key management costs
- Optimizes existing security, servers, high availability and disaster recovery investments, and can simplify complex key distribution
- Offers consolidated management of keys across domains and supports standards that extend management to IBM and non-IBM products
- Offers improved availability and support for disaster recovery by working with a wide variety of clustering, replication and failover implementations
- Provides automated clone replication that can clone up to five copies, and be configured to do automated backups of the master
Helps address regulations such as PCI-DSS
- Protects stored cardholder data
- Protects cardholder data where data is mandated to be unreadable
- Provides encryption as an optional layer of protection to help reduce the scope of audits
Reduces operating costs, speeds implementation and enables interoperability with wizard-based assistance
- Allows administrators to quickly configure different devices to use certain communication protocols, including the new industry-standard KMIP
- Provides an administration welcome page that delivers critical notices, including information about last backups, available protocols, new device registration requests and expiring certificates
- Offers a web-based GUI that helps ease key configuration and management tasks, including automating key provisioning, rotating keys and destroying keys