IBM Security Key Lifecycle Manager

Centralize, simplify and automate encryption key management

Encrypting data with confidence,
across the enterprise and beyond

IBM® Security Key Lifecycle Manager—formerly Tivoli Key Lifecycle Manager—centralizes, simplifies and automates the encryption and key management process to help minimize risk and reduce operational costs. It offers robust key storage, serving and lifecycle management for IBM and non-IBM storage devices.

IBM Security Key Lifecycle Manager helps meet regulations and standards such as the Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley and the Health Insurance Portability and Accountability Act (HIPAA). It supports the OASIS Key Management Interoperability Protocol (KMIP) standard.

IBM Security Key Lifecycle Manager:

Provides more efficient, simplified, consolidated and transparent key management

Offers simple secure integration between IBM storage systems and IBM Security Key Lifecycle Manager

Reduces key management costs

Helps address regulations such as PCI-DSS

Reduces operating costs, speeds implementation and enables interoperability with wizard-based assistance


IBM Security Key Lifecycle Manager resources

Buy IBM Security Key Lifecycle Manager

Centralize, simplify and automate encryption key management

IBM Software Subscription and Support is included in the product price for the first year.

Download software online after purchase - no shipping costs!

Basic Operating System Requirements for IBM Security Key Lifecycle Manager V2.5.0.3:


System components

Minimum values*

System memory (RAM)

4 GB

Processor speed

Linux and Windows systems
3.0 GHz single processor
AIX and Sun Solaris systems
1.5 GHz (2-way)

Disk space free for IBM Security Key Lifecycle Manager and prerequisite products such as DB2

5 GB

Disk space free in /tmp or C:\temp

2 GB

Disk space free in /home directory for DB2

5 GB

Disk space free in /var directory for DB2

512 MB on Linux and UNIX operating systems


Operating System Support Refresh provides support for the following Operating Systems for SKLM V2.5.0.3:


Platform

Operating System

AIX

AIX 6.1 POWER

AIX

AIX 7.1 POWER

Linux

SUSE Linux Enterprise Server (SLES) 11 x86-64

Linux

SUSE Linux Enterprise Server (SLES) 11 System z

Linux

SUSE Linux Enterprise Server (SLES) 10 x86-64

Linux

Red Hat Enterprise Linux (RHEL) Server 6 System z

Linux

Red Hat Enterprise Linux (RHEL) Server 6 x86-64

Linux

Red Hat Enterprise Linux (RHEL) 5 Advanced Platform x86-64

Linux

Red Hat Enterprise Linux (RHEL) 5 Advanced Platform System z

Solaris

Solaris 10 SPARC

Windows

Windows Server 2008 R2 Enterprise Edition x86-64

Windows

Windows Server 2008 R2 Standard Edition x86-64

Windows

Windows Server 2012 Standard Edition x86-64

Windows

Windows Server 2012 R2 Standard Edition x86-64

IBM Security Key Lifecycle Manager V2.5.0.3 enhancements include:

 

AES 256 Master Key: Ability to upgrade the master key that protects all the keys store in the Key Store data base from AES 128 to AES 256. This complies with PCI-DSS 3.1, which requires that the key used to protest data encrypting keys be at least as strong as the data encrypting key.

AES 256 Backup Encryption: Ability to upgrade the key that protects the backup from 3DES based PBE key to an AES 256 key. This complies with PCI-DSS 3.1, which requires that the key used to protest data encrypting keys be at least as strong as the data encrypting key.

Key Deletion Confirmation: This will add the date a key was last used to the warning confirmation on a request to delete a key. This will remind the customer when the key was last used before they confirm their request to delete the key.

User Admin PWD Change: Add a UI to change the admin password.

Proof of Encryption: Adds the ability to request the last time an encrypting device requested an encryption key. This allows the customer, through a command line, to confirm the last time an encrypting device requested a key and therefore performed encryption (read or write), which is useful information for auditors that want proof encryption is in place.

Syslog Support: This allows the existing SKLM audit logs to be spooled to a standard Syslog reader for Syslog processing. This allows customers to take advantage of Syslog to combine audit logs and include SKLM log.

Updated OS Support: Supports latest versions of AIX, Windows, Linux.

More

Not in United States?

Considering a purchase?

Contact IBM

Considering a purchase?