How to deploy DuoKey PLATFORM

Deployement Options

DuoKey offers the most flexible and scalable platform for Key management. Finding the right deployment option for your business whether it is on-premise, full cloud, or hybrid.

Secure And Protect Your Key at rest
Secure And Protect Your Key at rest

Deployment

Let’s start with where you are in your cloud journey.

Artboard Products DuoKey

On-premise

Some conservative or regulated enterprises need a on-premise solution. For these organizations, we recommend DuoKey Cockpit and DuoKey Server API, which combines fully enteprise on-premise key management service running on K8S or docker containers.

DuoKey Products Artboard

Cloud-First

Cloud-first enterprises need a cloud-native solution. For these organizations, we recommend DuoKey SaaS among our marketplace and Cloud partners like Microsoft, Google CGP or AWS. Our KmaaS combines fully managed Key management server and keys lifecycle automation in a single cloud platform. 

Products Artboard DuoKey

Hybrid

This model illustrates an on-premises KMS that is used for multi-cloud KMS integration/management that can be hosted either on premise or in the cloud and is linked to an on-premise cryptographic module such as an HSM or crypto card. This can also be extended using our MPC nodes running partially on-premise and some node in public cloud.

 

Platform

Now let’s find the right fit for your organization.

DuoKey SaaS

Deployment Options

ON-PREM

Self-Hosted

Deploy our key management solution (KMS) solution on-premise.

 

CLOUD-BASED

KmaaS

Deploy our key management solution (KMS) solution on-premise or in a private or public cloud.

MULTI-CLOUD

SaaS

Use our key management solution (KMS) solution in a private or public cloud.

MANAGE

Centralized control over the lifecycle and permissions of your keys
Import keys from your own key management infrastructure
Authenticated Discovery of Keys
Automatic rotation of root keys generated in DuoKey KMS once per year without the need to re-encrypt previously encrypted data

CONTROL

Role based access control to Vaults and Keys
Fine grained permissions on all crypto operations on Vaults and Keys
Approval and quorum system to change key state or revoke any object in the KMS
Conditional access control engine based on IP address, user email, location and Devices. Zero-Trust approach for using Keys.

VISIBILITY

Real-time Inventory of all Keys and Vaults objects
Change and Audit logs on all activity done on Keys and Vaults
Connection to Syslog or SPLUNK Log system for Deep dive analytics
Map and Geolocation of Keys and Crypto Operations Usage.

Modules

Extend the power of DuoKey appstore to deploy your preferred apps

Protect Your Micro Soft 365

Office 365

Centrally deploy, control, and manage cryptographic keys across your cloud and virtual environments.
Secure Your Valut Instance

Hashicorp Vault

Centrally deploy, control, and manage cryptographic keys across your cloud and virtual environments.

AWS S3

Centrally deploy, control, and manage cryptographic keys across your cloud and virtual environments.