Enterprise Secure Key Manager (ESKM)


A Complete Solution for Enterprise Key Management and Data Protection

Enterprise Secure Key Manager (ESKM) は、KMIP標準化相互運用性とHPE Secure Encryptionにより、データの喪失や誤用、および管理/運用に関連する攻撃からサーバ、ストレージ、およびクラウドを保護できる完備された鍵管理ソリューションです。 ビジネスに不可欠な機密保存データの暗号鍵への継続的なアクセスをローカルおよびリモートで保護し、維持することができます。

Securely protect access to encryption keys

ESKM v5 works with HPE ProLiant Gen8 and Gen9 Servers, 3PAR, NonStop, StoreEver, ESL G3, and more servers and storage devices to protect data at rest. ESKM v5 meets the highest standards for all HPE Storage and any OASIS KMIP enabled solutions.

(PDF 524 KB)

Key Features

  • HPEとパートナーのデータ保護ソリューションをサポート
  • ビジネスに不可欠な暗号鍵に対する可用性の高い保護されたアクセス
  • PCI-DSSやHIPAA、HITECH、PIIをはじめとする監査およびコンプライアンス要件に対応
  • 複数のデータセンター、数百のクライアント、および数百万の鍵に応じた拡張性のある鍵管理
  • FIPS 140-2レベル2検証済みで、最新のNISTのガイダンスをサポート

Key Protection Best Practices

Enterprise Secure Key Manager (ESKM) provides a secure, centralized key management solution for data encryption environments. This guide will provide guidance as to how to keep your ESKM key management environment in optimal condition.

(PDF 680 KB)

ESKMがCommon Criteria認定を獲得

HPE ESKM Common Criteria EAL2+ 認定についてお読みください。

HPE partner of Leidos Common Criteria lab

May 30, 2016, HPE Enterprise Secure Key Manager v4.1 achieved Evaluation Assurance Level 2+ certification with Leidos providing programmatic and technical consulting. Read the Leidos blog to learn the importance of this international DoD certification.

HPE Enterprise Secure Key Manager (ESKM) Video Demo

This ESKM video demo describes the benefits of using a key manager for encrypted data and contains product screen shots.

HPE ESKM KMIP Partner Qualification Program

Get started today! The Key Management Interoperability Protocol (KMIP) Partner Qualification Program for HPE ESKM offers guidance & resources to partners for integrating OASIS KMIP compliant solutions.

(PDF 272 KB)

PCI compliance with HPE ESKM and HPE NonStop

A Slovenian payment processor wanted to ensure PCI compliance for processing payment authorizations. They deployed HPE Enterprise Secure Key Manager (ESKM) to enable automated key management for encrypted data-at-rest volumes on HPE NonStop servers.

(PDF 274 KB)

HPE ESKM takes Top Reader’s Trust Award – 2015

HPE Atalla is pleased to accept the SC Magazine’s 2015 Reader Trust Award for Best Database Security Solution - HPE ESKM with HPE Secure Encryption, provides a complete key management solution for unifying and automating an organization’s encryption controls by securely creating, protecting, serving, controlling and auditing access to encryption keys.


White paper

Evolving Encryption Key Management Best Practices

(PDF 353 KB)

Case study

PCI compliance with HPE ESKM and HPE NonStop

(PDF 274 KB)

Data sheet

Connected MX and ESKM Secure Endpoint Devices

(PDF 724 KB)

Data sheet

ESKM v5 - Enterprise data protection

(PDF 524 KB)

White paper

Protect your business from ransomware attacks

(PDF 169KB )

White paper

Coping with the growing threat of Ransomware

(PDF 264 KB)

White paper

ESKM - Key Protection Best Practices

(PDF 680 KB)

Data sheet

Data Security Protection for HPE Helion

(PDF 1 MB)

Data sheet

Guidelines for Media Sanitization - HPE ESKM

(PDF 121 KB)

Data sheet

HPE ESKM KMIP Partner Qualification Program

(PDF 272 KB)

Solution brief

Manage Business-critical Keys with Ease

(PDF 410 KB)

White paper

Local, remote, and centrally unified key management with HPE ESKM

(PDF 4 MB)

Data sheet

Secure Encryption with ESKM – ProLiant Gen9 Servers

(PDF 1 MB)

Related Products, Solutions and Services

Data Security

Data Security & Encryption

Protect, manage, and control access to sensitive data.

Data Protection

SecureData Products

Data-centric security solutions protecting data across enterprise, cloud, mobile devices, and big data environments.

Secure eMail

SecureMail Products

End-to-end security for email and attachments.

Big Data Security

SecureData for Hadoop, Big Data and IoT

Data-centric approach to Big Data security while reducing risk and scope of regulatory compliance audits.

Secure Payments

SecureData Payments

Secure payment solution for retail transactions that gives complete point-to-point encryption to protect data.

Mobile Data Security

SecureData Mobile

Security and encryption for payment card data, Personally Identifiable Information and Personal Heath Information.

eCommerce Security

SecureData Web

eCommerce security solution that protects online payments and personal data captured at the browser.

Hardware Security Module (HSM)

Atalla HSM Network Security Processor-NSP

Guard financial data and meet industry security and compliance requirements.

Atalla Support

Atalla Technical Support and Training

Leverage our Atalla technical expertise and increase your own.

Security Intelligence Services

Threat Defense Services

Uncover and implement targeted solutions to the biggest threats to your enterprise.

Security Operations Center

Security Intelligence and Operations Consulting

Achieve maximum capabilities in your security operations through people and process.

Engage with our HPE Security Community

Protect Your Assets Blog

Get IT security insights to protect your business ahead of attackers anywhere in the world.

Security Research Blog

Get innovative research, observations and updates to help you proactively identify threats and manage risk.

Protect724 Community

Join the HPE Security community to share, search, collaborate for solutions and gain feedback.

HPE Security on Twitter

Get the latest tweets on hybrid environment risks and defending against advanced threats.

HPE Security on LinkedIn

Connect with experts and discuss the latest info on new threats and risk in hybrid environments.

HPE Software on Facebook

Join with peers and experts to discuss how to make your HPE software work for you.

HPE Software on Google+

Discuss the latest on how to make your enterprise applications and information work for you.

HPE Business Insights

Gain strategic insights from IT leaders who help others define, measure and achieve better IT performances.