Key Management as a Service
Cogito group are experienced Key Management service providers. Since 2011 Cogito Group have offered comprehensive Key Management as a service options. We can provide BYOK and HYOK, alongside dedicated or shared services including hardware offerings. Our offerings are designed to reduce organisational cost while improving security posture. Our key management services allow organisations to:
Key Management explained
Hackers aren’t looking to break your encryption, they want to find your keys.
When data is encrypted a new key is created. Keys need to be protected to ensure the means to unlocking your data remains secret.
Data encryption is classified in two types; symmetric and asymmetric. Each term refers to the respective number for keys used. Symmetric encryption uses one single key to encrypt and decrypt the data. In Asymmetric encryption, a public key encrypts data and a private key decrypts it. The public key can be freely distributed, however the private key must be kept very secure.
Key Management is the procedure of protecting keys, this involves identifying who holds the keys; how they are generated; how they are distributed, and how they are rotated.
WANT TO LEARN MORE ABOUT JELLYFISH?
1800 COGITO (264486)
or +61 2 6140 4494
0800 COGITO (264486)
or +64 4909 7580
Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington