15 years helping Israeli businesses
choose better software

Key Management Software

Key Management software allows organizations to manage computerized key cabinets, control user permissions, track key issuance, movements, and return.

Israel Show local products

43 results

Web-based SSH Key and SSL/TLS Certificate Management Solution for Enterprises Learn more about ManageEngine Key Manager Plus
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL/TLS environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Learn more about ManageEngine Key Manager Plus

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Virtru's flexible, easy-to-use, and trusted end-to-end encryption technologies govern access to data throughout its full lifecycle.
Virtru is a global leader in email and data encryption. Our flexible and easy to use end-to-end encryption solutions provide access controls, key management, DLP rules, and persistent audit for organizations to improve security, privacy and meet compliance requirements. At Virtru, we equip our users to have full control of their data, everywhere it’s shared. Learn more about Virtru

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Empowering enterprises with configurable, state-of-the-art facilities maintenance and asset management software for over 30 years.
TMA Systems provides facilities and asset management solutions that can be easily configured to your needs. For more than 30 years, TMA has provided reliable, innovative and trusted software solutions that help facility executives deliver value by reducing downtime, increasing maintenance productivity, improving equipment reliability and saving money. ‍ Our flagship solution WebTMA provides all the functionality you need to manage and maintain your capital assets while optimizing productivity. Learn more about WebTMA

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Logitout is a cloud based solution for managing & reporting movement of keys and more within your business. Log it. Track it. Love it.
The Logitout cloud dashboard is powered by awesome features and dynamic modules. We have everything you need to manage Property Keys, Assets and more in your business. It's secure and fast to use. Our dashboard keeps your team in control with in-depth reporting and notifications making spreadsheets a thing of the past! With our easy-to-use dashboard, at a glance you can see who has borrowed an item, if its reserved or even overdue. Logitout saves your business time and money, we guarantee it. Learn more about Logitout

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
A physical key management system that ensures optimal business operations, maximizes employee efficiency and ensures authorized access.
Keycafe is an intelligent key control that operates an IOT electronic key locker system. The cloud-based platform offers precise control over your keys, ensuring only trusted staff, contractors, tenants, and customers have access. With 24/7 key availability, granular permissions, and real-time alerts, you can confidently manage your entire fleet of keys. Full visibility and audit trails, so you'll never waste time chasing keys again. Learn more about Keycafe

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Key control and asset management solution to control your assets, employees, and keys.
Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Learn more about KeyTrak

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Israel Local product
Akeyless Vault is an unified platform for Secrets Management and Zero Trust Access
Akeyless is a Secrets Orchestration Platform, protecting and managing credentials, certificates and keys used by machines, applications and DevOps teams, in both hybrid and multi-cloud environments. It offers Secrets Management with extensions that provide Secure Remote Access and Data Protection. The Akeyless platform is FIPS 140-2 and SOC 2 Type 2 certified. Learn more about Akeyless Vault

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
KeyNest Pro is a unique key management system that tracks keys in and out of business premises, so you’ll never lose keys again.
Accessed through our app, KeyNest Pro is the only app-based key management PropTech solution on the market, and keeps all staff informed on where any keys are, who has them, and when they are due to be returned. Ludlow Thompson, Martin & Co, and Belvoir are just three of the many property experts using KeyNest Pro to keep a bird’s-eye-view on key movements in and out of the office. Learn more about KeyNest

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Cloud-based key management platform that enables businesses to control access and manage doors via smartphones or tags.
Salto KS provides wireless access control via a cloud platform. Once the Salto locks are installed, it is possible to control access from any location via mobile applications on smartphones. Doors can also be opened using tags. Managers can configure authorizations per tag and control who can access the tag for the specified duration across multiple rooms. Offline access is possible. Learn more about SALTO KS

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
AppViewX CERT+ is a robust, automated certificate lifecycle management (CLM) solution that simplifies PKI and certificate management.
AppViewX CERT+ is a comprehensive, automated certificate lifecycle management (CLM) solution that simplifies PKI and certificate management. It combines the best of automation, security, and insights to simplify all certificate operations between public and private Certificate Authorities (CAs) and the applications where certificates are deployed. CERT+ features are purpose-built to meet the certificate management needs of modern enterprise use cases, such as hybrid/multi-cloud, DevOps and IoT. Learn more about AppviewX CERT+

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
A Cloud-Based Facilities Lifecycle Management Solution that help facilities teams do more with fewer resources.
FAMIS 360 is a complete facilities lifecycle management/CMMS system. Like all CMMS systems, it can help users with space planning, utilities management, energy management, maintenance management, asset tracking, and compliance. That said, FAMIS 360 is purpose-built for higher education, CRE, and the public sector, and it has key functionalities – like key control and complete facilities lifecycle management – that make it an excellent tool for this space. Learn more about FAMIS 360

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Fortanix helps businesses secure their enterprise encryption keys to protect sensitive and regulated data at rest, in motion or in use.
Fortanix secures data, wherever it is. Fortanix mitigates potential risks by helping businesses secure their enterprise encryption keys to protect sensitive and regulated data at rest, in motion, or in use. The Fortanix Data Security Manager (DSM) platform is a data-first, unified security and privacy solution powered by Confidential Computing. Crypto and cloud architecture teams leverage Fortanix for HSM modernization and enterprise key management across hybrid, Multicloud environments. Learn more about Fortanix Data Security Manager

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Universal SSH Key Manager simplifies management of millions of keys. Gain compliance with total visibility.
The only effective strategy is to manage keys as a process, not as a vault, project or patch. Our approach is a closed-loop process with quick wins, starting with a free risk assessment. Gain and retain full control of all trusted access provisioning throughout the key lifecycle. Non-intrusive deployment, no agents to install, and no changes to existing scripts. Learn more about Universal SSH Key Manager

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
4SUITES is a system of connected hardware and software, powered by the Internet of Things.
4SUITES is a system of connected hardware and software, powered by the Internet of Things. We offer full cloud connected hotel door locks, lock upgrades, mobile keys and a cloud management platform for real-time monitoring and access control. Choose a 100% cloud based solution, including: -Cloud based mobile keys (no app install needed) -Cloud connected locks, lock upgrades and readers -Cloud based keycards (no data on card) -Real-time access management Learn more about 4SUITES

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Cloud-based platform that lets users manage their entire crypto estate, keys for applications, and more from a centralized platform.
Cloud-based platform that lets users manage their entire crypto estate, keys for applications, and more from a centralized platform. Learn more about Crypto Service Gateway (CSG)

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
HyTrust protects VMware virtual infrastructure with access, configuration, policy, forensic controls and capabilities for admins.
HyTrust protects VMware virtual infrastructure with access, configuration, policy, forensic controls and capabilities for admins. Learn more about HyTrust

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Scalable key management software solution with master keying, key control, management of key databases, and built-in reporting.
SimpleK is a key management software solution for facilities of any size. This complete, flexible, and intuitive software allows you to manage master key systems. SimpleK contains tools that help manage facilities, key control, and key databases. There are also solutions for cylinders and core pinning, personnel records and inventories, as well as buildings, doors, and floor plans. Learn more about SimpleK

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Key management solution that utilizes smart fobs for tracking and managing property keys.
Key management solution that utilizes smart fobs for tracking and managing property keys. Learn more about Keyzapp

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Software solution to help your business manage every key through a central database, with employee restrictions built in.
Software solution to help your business manage every key through a central database, with employee restrictions built in. Learn more about Key Organizer

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Key management solution that lets you manage and track all key details.
Key management solution that lets you manage and track all key details. Learn more about KeyZone

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Key management solution that allows you to use RFID technology for issuing and tracking your valuable keys throughout the company.
Key management solution that allows you to use barcode scanning and RFID technology for automatic or manual issuing and tracking your valuable keys throughout the company. Learn more about KeyCop Manager

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Key management solution that utilizes a key cabinet and value box to monitor and track keys and control user access.
Key management solution that utilizes a key cabinet and value box to monitor and track keys and control user access. Learn more about KeyWin

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Key control system that simplifies the process of key issuing, returning, and reissuing to your staff and key holders.
Key control system that simplifies the process of key issuing, returning, and reissuing to your staff and key holders. Learn more about Promaster Key Manager

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Web-based solution that provides key management through authorization tracking, customized query, and reporting.
Web-based solution that provides key management through authorization tracking, customized query, and reporting. Learn more about KeyWizard

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Key management solution that helps in monitoring keys through a smart key system & cabinets that support Lenel OnGuard integration.
Key management solution that helps in monitoring keys through a smart key system & cabinets that support Lenel OnGuard integration. Learn more about KeyBank Touch

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Web-based key management system that allows you to control access to your premises and track keys efficiently.
Web-based key management system that allows you to control access to your premises and track keys efficiently. Learn more about KeyKnox

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Israel Local product
Manage & protect encryption keys throughout the key entire lifecycle, across any hybrid cloud (any CSP) and multi-site environment.
Unbound enables organizations to manage and protect keys from a single pane of glass across any hybrid cloud and multi-site environment. Manage keys protected in Unbound FIPS 140-2 Level 2 validated virtual HSMs as well as in cloud providers key stores, with a unified system supporting common cryptographic APIs. Learn more about Unbound Key Control

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Enables digital key access, contactless rental, remote enforcement and more.
Enables digital key access, contactless rental, remote enforcement and more. Learn more about Keystone

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Automatically secure your servers and restrict SSH access to your team, with in-built scheduling and instant access revoking.
Automatically secure your servers and restrict SSH access to your team, with in-built scheduling and instant access revoking. Learn more about ServerAuth

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
It is a technology that completely eliminates the need for keys , controls, cards, facial or digital identification in buildings
It is a technology that completely eliminates the need for keys , controls, cards, facial or digital identification in buildings Learn more about BESAFE

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
BlueID allows company staff to use their smartphones as digital keys and implement authorization management.
BlueID provides users with a platform for authorization management. It enables the integration of mobile devices, allowing them to be used for digital keys and grant access to designated areas. The system is designed to increase security, for example, for office access. The use of analog keys or access cards is no longer necessary. Staff members can use their own smartphones and install an app for both Android and iOS operating systems. Learn more about BlueID

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
CipherTrust Data Security Platform helps businesses discover, secure and manage data across files, databases, applications, backups and
CipherTrust Data Security Platform helps businesses discover, secure and manage data across files, databases, applications, backups and other sources. Learn more about CipherTrust Data Security Platform

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, 24/7.
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, at any time. With the Klevio suite you have everything to easily manage access to your property or business: - Klevio hardware is installed at the property to deliver secure keyless access - The Klevio Dashboard is your access management tool with advanced key sharing & monitoring features - The Klevio Phone App is the digital key - the more secure and convenient way to unlock doors Learn more about Klevio

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
iQ.Suite aaS is a unified enterprise email management solution that provides powerful email security capabilities.
Central management and superior protection for your communication and collaboration. iQ.Suite is an Email Management and Collaboration Security platform that provides enterprise-level security, productivity and compliance for your communication. iQ.Suite offers: - Effective defense against cyber attacks - Central management for easy adoption and operation - Flexibility that allows companies to tailor the technology to their exact business and legal requirements. Learn more about iQ.Suite aaS

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Cloud-based data protection tool that enables businesses to maintain code security, set up encryption, and more.
Cloud-based data protection tool that enables businesses to maintain code security, set up encryption, and more. Learn more about ARCA Trusted OS

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Verimatrix Key shield protects any platform, any algorithm and any key. Its why the world’s leading banks use it to protect their apps.
Verimatrix Key shield eliminates the risk posed by exposed cryptographic keys in app code. The inbuilt Whitebox designer ensures you can define the optimum Whitebox solutions for your needs to bring massive performance gains. Verimatrix Key Shield obscures algorithms to keep critical applications and data safe – even if a hacker has complete access to the device on which the algorithms are executing. This is why CTOs and chief compliance officers at many of the world’s leading banks use Verimatr Learn more about Verimatrix Key Shield

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
CipherTrust Cloud Key Manager (CCKM) enables management and encryption of keys across public or private clouds from a single console.
Reduce management complexity, increase efficiency, and maintain a high level of security across clouds with the CipherTrust Cloud Key Manager (CCKM). Whether public or private clouds or on-prem infrastructure, CCKM protects your data with a single pane of glass view. Simplify key management with a single user interface and a common set of APIs across clouds. CCKM offers vendor-independent encryption and robust compliance and reporting tools. Learn more about CipherTrust Cloud Key Manager

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Blockchain infrastructure provider of data, tools and services for the Web3 economy.
Crypto APIs is a blockchain infrastructure provider offering a suite of data, tools and services that facilitate the interactions with blockchains. It supports over 12+ blockchain networks and has an ongoing commitment for onboarding more. The product portfolio includes Blockchain Data (unified REST APIs), Blockchain Events (Webhooks), Blockchain Tools (including xPub, yPub, zPub syncs and broadcasting transactions), Market Data, Node as a Service and Open-source Key Management System. Learn more about Crypto APIs

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Cryptaway is a Hardware Software Module gateway that provides simple interface for key management and cryptographic operations.
Cryptaway is a Hardware Software Module gateway that provides simple interface for key management and cryptographic operations. Learn more about Cryptaway

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Cloud-based key management solution that helps businesses streamline access control via key tags, key boxes, and more.
Cloud-based key management solution that helps businesses streamline access control via key tags, key boxes, and more. Learn more about Kylaria

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
With Thales Data Protection on Demand, you don’t need to choose between flexibility, efficiency, and security. Protect data anywhere.
Thales Data Protection on Demand provides HSM and key management services while making security easy and cost-effective. Deploy your required services, provision users, add devices, and obtain usage reporting in a matter of minutes. Preconfigured APIs offer easy integration with scalable services and pay-as-you-go pricing. Thales manages all hardware, software, and infrastructure, allowing staff to focus on other business needs. Learn more about Data Protection on Demand

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
Store keys, manage lifecycle tasks, and address regulatory and compliance requirements from a single pane with CipherTrust Manager.
Straightforward yet powerful, CipherTrust Manager from Thales empowers you to discover, classify, and protect your data from a central point. Manage encryption key lifecycle, define role-based access control, and generate robust reports for auditing or compliance. Available in virtual or physical appliances, CipherTrust Manager can securely store keys, set policies, and ensure your most critical data is safe from bad actors. All with cloud-friendly deployment and a developer-friendly REST API. Learn more about CipherTrust Manager

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying
You Can Digitally manage your registers and Centralise access to all of your Enterprise's registers Using Digital Register Software .
The TechnoRishi Digital Register Management System allows you to manage all of your registers at any time and from any location. The resource's valuable time will be saved since it will remove all manual tracking and ensure that data entering errors are avoided. Users can quickly access, store, and retrieve data. Thanks to our feature-rich system, Any field in the entire programme can have its labels and captions changed and it is a Dynamic software Solution that is Entirely Customizable. Learn more about Digital Register Management System

Features

  • Audit Trail
  • Access Controls/Permissions
  • Key Holder Management
  • Rekeying