• (888) 963-6358
  • pfsales@primefactors.com

    PCI Key Management and More

    EncryptRIGHT® lets you meet PCI key management requirements, and much more such as support for PGP. Whether you use PGP or not, EncryptRIGHT gives you the central control you need to streamline key management. Keys are distributed securely from a central management application and stored in a secure database. From a central point, you manage keys and security settings for a large number of end points.

    EncryptRIGHT has everything you need to achieve PCI key management compliance. It supports all PCI compliance key management requirements from section 3.5 to 3.6.7. Comprehensive central key management insures that you comply with PCI encryption key management requirements for key generation, distribution, storage, rotation and replacement.

    EncryptRIGHT provides the flexibility to implement and document key management processes and procedures that meet PCI compliance requirement 3.6. EncryptRIGHT also generates strong cryptographic keys, protects against disclosure and misuse, facilitates secure key distribution and storage, and provides the ability to change keys periodically and retire or replace old or suspected compromised keys.

    EncryptRIGHT PCI Requirements Checklist

    Gain control of PGP key management with EncryptRIGHT

    EncryptRIGHT provides key management for OpenPGP that reduces the risk associated with using PGP enterprise-wide. It facilitates secure key storage and distribution throughout your organization.

    EncryptRIGHT eliminates the one-off manual processes inherent in most PGP key management deployments, and puts management of PGP keys in the hands of the appropriate people in your organization. It provides the flexibility to implement and document key management processes and procedures that make keys available throughout the enterprise, when and where they are needed.

    EncryptRIGHT key management for OpenPGP (RFC 4880) simplifies management of all OpenPGP keys, and makes it easier and more convenient for users to encrypt and decrypt files. PGP keys are distributed securely from a central management application and stored in a secure database. From a central point, you manage PGP keys and security settings for a large number of end points.

    When encrypting or verifying PGP files, EncryptRIGHT can fetch keys from external key servers following HKP, LDAP, LDAP SSL and HTTP key server protocols, plus you can set up the EncryptRIGHT server as a PGP HKP Key Server.

    You can create and manage OpenPGP keys within your organization using EncryptRIGHT, and also provide a key server for public keys that doesn’t require EncryptRIGHT to access and download a public key. For example, a person who received a secured file could use GnuPG to connect to the EncryptRIGHT key server and download the signature verification key automatically.

    EncryptRIGHT’s encryption capabilities include the ability to sign, encrypt and verify a single file or files in recursive directories. PGP processing can be executed through the user interface, from the command line or using the API in your applications.

    Other benefits of EncryptRIGHT 3.0 key management for OpenPGP:

    • You maintain business continuity because keys are always available, where data is located and when they are needed
    • You separate duties between security professionals and end users
    • You save time with easy-to-use auditing tools and automatic key rotation and destruction
    • You can deploy it across platforms from z/OS to Unix to Windows

    Meet needs for security, risk reduction and business continuity

    Based on Prime Factors’ 30-plus years of experience, EncryptRIGHT was designed so you can implement a PCI compliance key management solution that meets your needs for security, risk reduction and business continuity today and in the future. Here's how:

    • Eliminates the manual processes inherent in most companies' key management
    • Meets PCI key management compliance requirements for handling keys
    • Makes keys available throughout the enterprise, when and where they are needed
    • Maintains business continuity because keys are always available, where data is located and when it is needed
    • Separates duties between security professionals, programmers, and users, providing another layer of data protection
    • Saves time with easy-to-use auditing tools and automatic key rotation and destruction