ESKM(Enterprise Secure Key Manager)

데이터와 신뢰도를 보호하며 업계 규정을 준수하도록 키 관리

A Complete Solution for Enterprise Key Management and Data Protection

KMIP 표준 상호 운용성과 HPE Secure Encryption으로 무장한 ESKM(Enterprise Secure Key Manager)은 피해와 실수, 관리 및 운영 공격에 대비하여 서버, 스토리지, 클라우드를 안전하게 보호하는 종합적인 관리 솔루션입니다. 이 솔루션을 사용하면 사업부에 중요하고 민감한 미사용 암호화 키에 대한 지속적인 액세스를 로컬 또는 원격으로 모두 보호하고 보존할 수 있습니다.

Securely protect access to encryption keys

ESKM v5 works with HPE ProLiant Gen8 and Gen9 Servers, 3PAR, NonStop, StoreEver, ESL G3, and more servers and storage devices to protect data at rest. ESKM v5 meets the highest standards for all HPE Storage and any OASIS KMIP enabled solutions.

(PDF 524 KB)

Key Features

  • HPE 및 파트너 데이터 보호 솔루션 지원
  • 사업부에 중요한 암호화된 키에 대한 액세스를 보호하고 고가용성 제공
  • 감사 및 컴플라이언스 요구 사항(PCI-DSS, HIPAA, HITECH 및 PII 포함) 지원
  • 여러 데이터 센터, 수백 개의 클라이언트 및 수백만 개의 키를 지원하는 확장성 키 관리
  • FIPS-140-2 레벨 2 인증, 최신 NIST 지침 지원

Key Protection Best Practices

Enterprise Secure Key Manager (ESKM) provides a secure, centralized key management solution for data encryption environments. This guide will provide guidance as to how to keep your ESKM key management environment in optimal condition.

(PDF 680 KB)

ESKM, 공통 평가 기준 인증

HPE ESKM 공통 평가 기준 EAL2+ 인증에 대해 알아보십시오.

HPE partner of Leidos Common Criteria lab

May 30, 2016, HPE Enterprise Secure Key Manager v4.1 achieved Evaluation Assurance Level 2+ certification with Leidos providing programmatic and technical consulting. Read the Leidos blog to learn the importance of this international DoD certification.

HPE Enterprise Secure Key Manager (ESKM) Video Demo

This ESKM video demo describes the benefits of using a key manager for encrypted data and contains product screen shots.

HPE ESKM KMIP Partner Qualification Program

Get started today! The Key Management Interoperability Protocol (KMIP) Partner Qualification Program for HPE ESKM offers guidance & resources to partners for integrating OASIS KMIP compliant solutions.

(PDF 272 KB)

PCI compliance with HPE ESKM and HPE NonStop

A Slovenian payment processor wanted to ensure PCI compliance for processing payment authorizations. They deployed HPE Enterprise Secure Key Manager (ESKM) to enable automated key management for encrypted data-at-rest volumes on HPE NonStop servers.

(PDF 274 KB)

HPE ESKM takes Top Reader’s Trust Award – 2015

HPE Atalla is pleased to accept the SC Magazine’s 2015 Reader Trust Award for Best Database Security Solution - HPE ESKM with HPE Secure Encryption, provides a complete key management solution for unifying and automating an organization’s encryption controls by securely creating, protecting, serving, controlling and auditing access to encryption keys.


White paper

Evolving Encryption Key Management Best Practices

(PDF 353 KB)

Case study

PCI compliance with HPE ESKM and HPE NonStop

(PDF 274 KB)

Data sheet

Connected MX and ESKM Secure Endpoint Devices

(PDF 724 KB)

Data sheet

ESKM v5 - Enterprise data protection

(PDF 524 KB)

White paper

Protect your business from ransomware attacks

(PDF 169KB )

White paper

Coping with the growing threat of Ransomware

(PDF 264 KB)

White paper

ESKM - Key Protection Best Practices

(PDF 680 KB)

Data sheet

Data Security Protection for HPE Helion

(PDF 1 MB)

Data sheet

Guidelines for Media Sanitization - HPE ESKM

(PDF 121 KB)

Data sheet

HPE ESKM KMIP Partner Qualification Program

(PDF 272 KB)

Solution brief

Manage Business-critical Keys with Ease

(PDF 410 KB)

White paper

Local, remote, and centrally unified key management with HPE ESKM

(PDF 4 MB)

Data sheet

Secure Encryption with ESKM – ProLiant Gen9 Servers

(PDF 1 MB)

Related Products, Solutions and Services

Data Security

Data Security & Encryption

Protect, manage, and control access to sensitive data.

Data Protection

SecureData Products

Data-centric security solutions protecting data across enterprise, cloud, mobile devices, and big data environments.

Secure eMail

SecureMail Products

End-to-end security for email and attachments.

Big Data Security

SecureData for Hadoop, Big Data and IoT

Data-centric approach to Big Data security while reducing risk and scope of regulatory compliance audits.

Secure Payments

SecureData Payments

Secure payment solution for retail transactions that gives complete point-to-point encryption to protect data.

Mobile Data Security

SecureData Mobile

Security and encryption for payment card data, Personally Identifiable Information and Personal Heath Information.

eCommerce Security

SecureData Web

eCommerce security solution that protects online payments and personal data captured at the browser.

Hardware Security Module (HSM)

Atalla HSM Network Security Processor-NSP

Guard financial data and meet industry security and compliance requirements.

Atalla Support

Atalla Technical Support and Training

Leverage our Atalla technical expertise and increase your own.

Security Intelligence Services

Threat Defense Services

Uncover and implement targeted solutions to the biggest threats to your enterprise.

Security Operations Center

Security Intelligence and Operations Consulting

Achieve maximum capabilities in your security operations through people and process.

Engage with our HPE Security Community

Protect Your Assets Blog

Get IT security insights to protect your business ahead of attackers anywhere in the world.

Security Research Blog

Get innovative research, observations and updates to help you proactively identify threats and manage risk.

Protect724 Community

Join the HPE Security community to share, search, collaborate for solutions and gain feedback.

HPE Security on Twitter

Get the latest tweets on hybrid environment risks and defending against advanced threats.

HPE Security on LinkedIn

Connect with experts and discuss the latest info on new threats and risk in hybrid environments.

HPE Software on Facebook

Join with peers and experts to discuss how to make your HPE software work for you.

HPE Software on Google+

Discuss the latest on how to make your enterprise applications and information work for you.

HPE Business Insights

Gain strategic insights from IT leaders who help others define, measure and achieve better IT performances.