Features:
● Complete Audit Trail: Admins can keep track of all critical retrievals and system activities of key management. For a timely and fixed record of events, reports are sent to the central log management.
● Fundamental Change and Rotation: Based on the internal policies, the frequency of key rotation can be defined by the administrators. The old version goes into a historical database when the new version replaces it just after a critical change.
● Sample Client Binary and Source Applications: For all mega OS, Binary key retrieval and encryption libraries are provided for better speed of deployment key retrieval. Java, COBOL, and other applications are submitted with sample source code.