KMES Series 3

Encryption key management system

Key Management System KMES 3 server
Much more than an HSM

An enterprise-class key management system

The Key Management Enterprise Server (KMES) Series 3 is a powerful and scalable key management solution. It unites every possible encryption key use case from root CA to PKI to BYOK. Automate and script key lifecycle routines. Secure private keys with a built-in FIPS 140-2 Level 3 validated HSM. Deploy it on-premises for hands-on control, or in the cloud for native integration with public cloud providers. The KMES Series 3 is the last word on encryption key management and is the cornerstone of enterprise cryptographic ecosystems around the world.

Sales brochureTalk to an expert

Data protection

  • Integrate application encryption into software
  • Secure databases with transparent data encryption (TDE)
  • Drag-and-drop files for automatic encryption
  • Tokenize data without token vaults to limit compliance scope
  • Support for PKCS #11, JCA/JCE, Open SSL, and much more

PKI and CA

  • Establish an offline root CA for foundational security
  • Manage certificate lifecycles with an issuing CA
  • Encrypt communication between network devices
  • Define CRLs and OCSPs to improve management
  • Manage signatures to authenticate digital objects

Code signing

  • Issue certificates to authenticate code
  • Automate your enterprise code signing operations
  • Digitally sign firmware to enhance security
  • Integrate with Microsoft Authenticode or Java jarsigner

Payment key management

  • Load and rotate keys remotely (RKL)
  • Establish point-to-point encryption (P2PE)
  • Create, store, encrypt, and sign payment keys
Key management server KMS
Automation

Manage encryption key lifecycles efficiently with sophisticated automation and scripting options. Reduce the manual effort involved with automated backups.

Multi-application support

Establish a logically isolated cryptographic resource pool to be shared among different applications with the KMES Series 3’s segregated key containers.

Interoperability

Design a highly available network of Futurex devices which communicate via a common code base to synchronize encryption keys and certificates.

Why choose the KMES Series 3?

The KMES Series 3 stands alone among key management solutions. It is a dynamic, all-in-one key management tool with support for all common vendor-neutral APIs, flexible automation and scripting capabilities, and an embedded FIPS 140-2 Level 3 validated HSM.

This makes it fast to deploy, easy to integrate, and efficient to manage, all while adhering to the most rigorous physical and logical compliance requirements. With on-premises, cloud, and hybrid deployment options, your key management possibilities are virtually unlimited.

Click diagram to enlarge

Centralized key management

On its own, the KMES Series 3 manages keys across an enterprise, delivering PKI and CA. Integrating it with other HSMs multiplies its effectiveness.

Multi-tenancy

The KMES is designed to work with multi-tenancy environments, making it a powerhouse of cryptographic infrastructure.

Programmatic automation

With the KMES can automate tasks like creating groups, rotating keys, revoking certificates, signing objects, and testing communication with granular detail.

Embedded HSM handles encryption

The KMES contains an embedded Futurex HSM certified under FIPS 140-2 Level 3 and PCI PTS HSM.
Related: Externalized key management

Deploy cloud functions like BYOK, EKM, and CSE to expand your service offerings.

See it now

Related: Key lifecycle management

Learn more about how the KMES manages encryption key lifecycles.

See it now

Simple, secure key management

Symmetric & asymmetric key management for 3DES DUKPT, X.509 v3, EMV and support for X9.17, AKB, and TR-31 (with custom fields).

Role-based access management

Permission-based user access control enforces dual control and segregation of duties. Includes exportable user activity logs.

Ease of use

The intuitive user interface doesn’t require command-line tasks for initial setup, regular auditing, firmware upgrades, or maintenance.

Versatile PKI functionality

The KMES supports mutual authentication under an offline root CA. It can generate and manage self-signed certificates to establish a trusted PKI.

PCI-compliant remote key distribution

Remotely distribute keys across ATMs and POS devices (including mobile POS) to reduce logistical and compliance burdens.

Custom auditing and reporting

Automatically sign and send activity logs to a remote syslog server for internal and external audits.

Multi-purpose and highly compliant

Versatile key management solutions for enterprise and financial use.

KMES Series 3 specifications

Hardware features

  • Dual control-enabled, tamper-responsive
  • Smart card reader for M-of-N key fragmentation and dual-factor authentication
  • Dual, redundant gigabit Ethernet ports
  • Dual, redundant, hot-swappable power supplies
  • Automated, internal RAID-based backup of object management applications and databases

External hardware requirements

  • Keyboard: Standard USB
  • Mouse: Standard USB
  • Video: Standard SVGA 1024×768 at 75Hz refresh
  • PostScript-compatible printer for key printing (Optional)

Operating conditions

  • Power Supply Configuration: Standard AC with two redundant, hot-swappable supplies
  • Voltage: 90 VAC – 264 VAC
  • Frequency: 47 Hz – 63 Hz
  • Maximum Current (115/230 VAC): 12 / 6
  • Efficiency: 80% (minimum)
  • Operating temperature: 50° – 95°F (10° – 35°C)
  • Storage temperature: 5° – 140°F (-15° – 60°C)
  • Operating relative humidity: 20% – 80% (RH non-condensing)
  • Storage relative humidity: 10% – 85% (RH non-condensing)

Dimensions and weight

  • Height: 2U – 3.5 inches (8.9 cm)
  • Length: 24.63 inches (62.56 cm)
  • Width: 19 inches (48.3 cm)
  • Weight: 43.5 lbs. (19.73 kg)

Unit includes

  • Application CD
  • Rack mount installation kit
  • Two sets of two barrel keys
  • Four smart cards
  • Two power cables

Powering the VirtuCrypt cloud

VirtuCrypt key management services are backed by the KMES Series 3 with hardened, FIPS 140-2 Level 3 validated technology. Whether an organization requires complete infrastructure management or simply more functionality for existing Futurex infrastructure, VirtuCrypt offers a variety of service structures designed to meet security requirements.

VirtuCrypt services
VirtuCrypt cloud HSM

Industry compliance standards

  • FIPS 140-2 Level 3
  • EMVCo
  • PCI DSS
  • ANS X9.24 – Part 1 and Part 2
  • RoHS
  • FCC Class B – Part 15
  • Applicable future compliance mandates

Key types and protocols

  • DES
  • Triple DES
  • DUKPT
  • X.509 v3
  • AES
  • RSA
  • EMVCo
  • KMIP

EMV certificate management

  • All major card brands supported
  • Issuer self-signed certificate creation and export
  • Creates ICC certificates to EMVCo specifications

Frequently Asked Questions

Key management is the cryptographic process of creating, distributing, storing, and destroying encryption keys. The process is carried out with cryptographic technology such as hardware security modules (HSMs) and key management servers.

An encryption key is a string of bits created by a key generation algorithm. The algorithm is processed in hardware within the physically secure boundary of an HSM. The HSM circuit board features a hardware-based, independent random number generator (RNG) that randomizes the bits in the key. After the key is created, it can be used in an encryption algorithm to encrypt data, making it unreadable to unauthorized parties.

A key management server is cryptographic hardware designed to handle every aspect and use case related to key management. That includes creating encryption keys, storing them, managing the policies that determine key rotation and deletion, encrypting the keys, and digitally signing them. Beyond dealing with individual keys, Futurex key management servers can easily establish a certificate authority (CA), a logical entity which creates and issues digital certificates. Certificates can be used to create trust throughout entire networks by providing a secure way to authenticate users, devices, and documents. The key management server also establishes policies to help manage CAs, creating public key infrastructure (PKI) on an enterprise level.

As a crucial cryptographic operation, key management functions are usually performed within the physically secure boundaries of HSMs. As such, some HSMs can fulfill key management use cases. Futurex key management servers are cryptographic hardware dedicated to key management. This means they have the same level of physical and logical security as HSMs, but their architecture is specially designed to fulfill every key management use case an enterprise might need.

Step one: talk to a trusted vendor. Step two: look for a centralized solution. For example, Futurex’s KMES Series 3 was designed to give our customers exactly what they wanted in a key management solution: a one-stop-shop for all key management use cases. From PKI and CA to automatic key rotation and digital signing, the KMES can not only deploy any key management functionality, it can scale to manage keys on an enterprise level. All from a single, central platform deployed on-premises or in the cloud.

Pardon our slang, but the KMES Series 3 is a beast when it comes to functionality. It supports every major encryption algorithm, whether symmetric, asymmetric, hashing, elliptic curve, or what have you. Thanks to its flexible code base, it can be quickly configured to support new and emerging algorithms as well. Bit length is easily configurable, whether we’re talking AES 256 or RSA 8192-bit. In fewer words, the KMES Series 3 does it all.

There’s a big difference between running a key management software application on your computer, and integrating a key management server with your IT infrastructure. With a hardware-backed solution like an HSM or key management server, dedicated components on the circuit board perform encryption functions, taking the processing load away from the CPU. Encryption keys are also stored within dedicated hardware components. All of these components are protected by a physically secure, tamper-resistant boundary.

On the other hand, software-based key management is implemented through software applications running on the host’s CPU. The software application uses the CPU to execute encryption algorithms. With software, encryption keys are stored in the computer’s memory or storage device, posing a major security risk (among others).

Want to learn more?

Contact a Solutions Architect today.

Give us a call


Futurex key management system customers