Skip Navigation
https://106c4.wpc.azureedge.net/80106C4/Gallery-Prod/cdn/2015-02-24/prod20161101-microsoft-windowsazure-gallery/dyadic_security.ukc_pairukc.1.0.2/Icons/Large.png

Unbound Key Control

dyadic_security
Flexible, agile & scalable Key Management: making crypto easy, cost-effective and more secure.
https://gallery.azure.com/artifact/20151001/dyadic_security.ukc_pairukc.1.0.2/Artifacts/Thumbnails/945a02d4-77b8-43d0-a923-acc70de4ac4c.png
/images/videoOverlay.png
https://gallery.azure.com/artifact/20151001/dyadic_security.ukc_pairukc.1.0.2/Artifacts/Thumbnails/945a02d4-77b8-43d0-a923-acc70de4ac4c.png
/images/videoOverlay.png
https://106c4.wpc.azureedge.net/80106C4/Gallery-Prod/cdn/2015-02-24/prod20161101-microsoft-windowsazure-gallery/dyadic_security.ukc_pairukc.1.0.2/Screenshots/Screenshot1.png
https://106c4.wpc.azureedge.net/80106C4/Gallery-Prod/cdn/2015-02-24/prod20161101-microsoft-windowsazure-gallery/dyadic_security.ukc_pairukc.1.0.2/Screenshots/Screenshot2.png
https://106c4.wpc.azureedge.net/80106C4/Gallery-Prod/cdn/2015-02-24/prod20161101-microsoft-windowsazure-gallery/dyadic_security.ukc_pairukc.1.0.2/Screenshots/Screenshot3.png

Unbound Key Control

dyadic_security

Flexible, agile & scalable Key Management: making crypto easy, cost-effective and more secure.

Of all the data elements used in the cloud, cryptographic keys are by far the most sensitive, as they are crucial for performing critical tasks such as data protection and identity and authenticity proof. Compromise or loss of these keys could render fatal results that are irrevocable such as data loss, mass data theft or erosion of business reputation. Thus, cryptographic key control in the cloud is a fundamental requirement for enterprises and therefore it becomes a requirement for the IaaS and SaaS providers to offer full key control solutions to their customers who demand it. Unbound Key Control (UKC) lets you manage and control keys in any application deployed in Azure. This pure-software solution is easy to deploy and maintain, while giving you unmatched levels of security and control for your crypto keys in the cloud. Based on Unbound vHSM technology, the keys are guaranteed to never appear in the clear, not even when generated or while at use – ensuring your most sensitive keys are kept private at all times. Abstracted from dedicated hardware, UKC can be deployed across your entire decentralized hybrid cloud and geo-distributed multi-region environments as a unified cluster of Unbound UKC where all crypto keys can be managed from one centralized system with a single pane of glass. Keys automatically sync between different sites and workloads to ensure no more key management in silos. Benefits & Features:
  • Supports any general purpose HSM and KMIP use cases, e.g. code signing, blockchain key management, database encryption, CA etc.
  • Real-time, tamper proof audit log that logs ANY key operation
  • REST API provides easy automation of initial setup and day-to-day management
  • High availability for multi-region deployments
  • Integration with Azure native services, e.g. Azure Storage and TDE for SQL Server
  • Supports all standard crypto APIs such as KMIP, PKCS#11, Microsoft CNG, OpenSSL engine and Dyadic SDK for .NET, Java, Python and PHP
  • In certification process for FIPS 140-2
Unbound supports all enterprises wanting to protect their crypto keys (and other secrets) without the hassle of dedicated hardware. Uses cases include:
  • Database Encryption
  • Application Level Encryption
  • Code Signing
  • Blockchain Key Management
  • Authentication
  • Document Signing
  • SSL/TLS
  • Cloud Application Security
About Unbound: At the heart of Unbound, formerly known as Dyadic Security lie the sophisticated applications of Multi-Party Computation (MPC), developed by Unbound’s co-founders, Professor Yehuda Lindell and Professor Nigel Smart, world-renowned cryptographers. MPC offers a mathematical guarantee of security that allows Unbound to protect crypto keys beyond physical boundaries, from edge to cloud and anywhere in between, without any reliance on dedicated hardware.
https://gallery.azure.com/artifact/20151001/dyadic_security.ukc_pairukc.1.0.2/Artifacts/Thumbnails/945a02d4-77b8-43d0-a923-acc70de4ac4c.png
/images/videoOverlay.png
https://gallery.azure.com/artifact/20151001/dyadic_security.ukc_pairukc.1.0.2/Artifacts/Thumbnails/945a02d4-77b8-43d0-a923-acc70de4ac4c.png
/images/videoOverlay.png
https://106c4.wpc.azureedge.net/80106C4/Gallery-Prod/cdn/2015-02-24/prod20161101-microsoft-windowsazure-gallery/dyadic_security.ukc_pairukc.1.0.2/Screenshots/Screenshot1.png
https://106c4.wpc.azureedge.net/80106C4/Gallery-Prod/cdn/2015-02-24/prod20161101-microsoft-windowsazure-gallery/dyadic_security.ukc_pairukc.1.0.2/Screenshots/Screenshot2.png
https://106c4.wpc.azureedge.net/80106C4/Gallery-Prod/cdn/2015-02-24/prod20161101-microsoft-windowsazure-gallery/dyadic_security.ukc_pairukc.1.0.2/Screenshots/Screenshot3.png