DuoKey Cockpit™
Secure Keys and Secure Usage
SAFEGUARD YOUR MOST SENSITIVE KEYS
DuoKey KMS can be installed on-premise using our terraform software-defined script or docker deployement. Minimum of 3 dockers are required for running our MPC node withtin your infrastructure
NO LEAKAGE OR THEFT
We provide unmatched cryptographic key security and operational agility by utilizing a containerized software approach
PROTECTED ACCESS
Cryptographic Keys are generated across multiple MPC key servers collectively referred to as a Threshold Security Module (TSM)
COMPLETE AUDIT AND VISIBILITY
The TSM provides cryptographic key management functions across different trust domains (CSPs, or private DCs) and at no time is the entire key present on any single server
Power of Multi-Party Computation
MPC (Multi-party computation) is an innovative way to reduce complexity to store sensitive key material in one place and eliminate the concept of private keys. Every encryption is performed in a secure, distributed way to protect against cyber breaches, physical damage, and insider collusion.
DuoKey Key Management provides unmatched cryptographic key security and operational agility by utilizing a containerized software approach. Cryptographic Keys are generated across multiple MPC key servers collectively referred to as a Threshold Security Module (TSM). The TSM provides cryptographic key management functions across different trust domains (CSPs, or private DCs) and at no time is the entire key present on any single server
- Trust nobody
- Always available
- Control your keys
Central key management.
According to Ponemon institute, 60% of respondents rate key management as very painful, which suggests respondents view managing keys as a very challenging activity. The highest percentage pain threshold of 67 percent occurs in Germany. At 38 percent, the lowest pain level occurs in France. No clear ownership and lack of skilled personnel are the primary reasons why key management is painful.
DuoKey Key Management is the industry’s first true cloud-native key management system. It utilizes patented technology and Multiparty Computation (MPC) to provide cryptographic key management with security equivalent to an HSM, with high-availability in a pure-cloud fashion.
It delivers keys to any cloud service, requires no trust in any service provider, and enables total key immunity against malicious actors, side-channel attacks, state-nation hacking, and unlawful or unauthorized key access
- Leveraging Multi-Party Computation
- Always available
- Control your keys

DuoKey has resolved an operational headache for us by relieving the day-to-today management of encryption keys.
Senior Information Security Architect
Highly secure, always protected.
The ability of MPC-based systems to maintain operations even where parties become corrupt, to continue with many operations even if one or potentially more parties become unavailable, and the ability to refresh or regenerate keys or key shares even when a subset of parties are corrupt provides a materially higher degree of system availability than traditional appliance-based key management solutions
KmaaS Built for Your Application Stack
Integration with industry-leading enterprise and DevOps tools makes it easy to issue
trusted identities to users, devices, and applications across the business.