Key management

Ensure data integrity with military grade cryptographic key management.

Best of Breed Choice

Encryption and key management are vital components for the entire security and IT ecosystem. Because of its time-tested pedigree, key management technologies interconnect with a broad range of systems and services across an IT infrastructure. Our Key Management solutions are built to be part of a holistic, strategic security plan that is based on best practices and optimal security.

Assured Protection

Our Secure Key Management Solution has been developed by our cyber experts to produce, manage and disseminate cryptographic keys for implementation into individual storage devices. This secured design ensures the security-integrity of removable devices and their connected networks and ultimately preventing compromising activities from unauthorised threat actors.

Critical Environment Tested

Our Key Management solutions maintain the highest possible protection of encrypted data and minimises the risk of threats to an organisation’s security posture. Our solutions have been successfully implemented on a variety of platforms and innovative delivery devices, including highly critical government, defense and commercial environments.

Adaptable Solution Range

Boasting the highest levels of military and NIST certifications, Ultra provides Key Management solutions for both Military and Commercial requirements. Our Cryptographic and Key Management solutions can manage keys across heterogeneous encryption platforms, offering support for the Key Management Interoperability Protocol (KMIP) standard, as well as proprietary interfaces. Our solutions streamline operations by centrally organizing and allowing robust control over keys.

Protecting Keys in Transit

Even today, in many instances, humans have to deliver new key material, often to inhospitable or dangerous places. Ultra’s solutions allow key material to be moved electronically reducing costs, the chance for costly errors, security breaches and more. They avoid duplication and ensure all key material movements are tracked and audited.

The Hidden Key: Cryptographic Key Management and HSMs

Encryption and the keys involved in the encryption process are, for most of us, an invisible part of our everyday modern lives. However, how these keys are managed and controlled is vitally important, with extremely serious repercussions should “things go wrong”. This webinar explores this part of the world of cybersecurity, namely the subject of key management and how Hardware Security Modules (HSMs) can provide the necessary security and controls.

Boasting the highest levels of military and NIST certifications, our cryptographic key management solutions provide the protection and assurance required by military and civilian organisations.


KeyperPLUS secures the most sensitive data and information systems, employing a next generation flexible crypto platform that provides the highest level of assurance over the integrity of the information it holds.

Where cryptographic security is critical, such as for businesses in PKI, VPN and internet security, only a physically separate Hardware Security Module (HSM) offers a level of security that provides reassurance that the integrity of essential data is maintained, making it a critical element in any security system.

Robust and reliable HSM technologies offer the ultimate layer of protection for sensitive information, going far beyond the layers of security offered by mediums including software, smart cards and USB tokens. The security of the underlying signing and encryption keys ensures the protection of those elements critical to the security of the system.

KeyperPLUS has been specifically designed to limit all potential points of access with a tamper-resistant design, ensuring only those with intended permission are able to access the sensitive data it protects. Through vigorous and careful management of any areas of physical or digital infiltration, KeyperPLUS delivers a robust solution that meets the most stringent of security standards.

Based on this core technology, Ultra has built a product range to cater to the PKI, VPN and Internet security markets. The KeyperPLUS HSM is ideally suited to businesses deploying a cryptographic system where the protection of cryptographic keys is a priority, for example, in organisations requiring certificate signing, code or document signing, bulk generation or ciphering of keys or data.


COMSEC Accounting, Reporting & Distribution System (CARDS) is a web-based application that provides full life-cycle support for an organisation’s COMSEC assets and automates all management-related tasks within an organisation. CARDS supports the “business” of COMSEC.

From key managers sitting at the COR to COMSEC custodians and everyone in between, CARDS has functionality for everyone in the COMSEC umbrella. Based on a central database, CARDS lets each user have access to the information they need (and only the information they need) in real time, simplifying and automating the task of running a COMSEC organization. CARDS saves an organisation time and money, minimising potentially costly mistakes.

Remote Cryptographic Management System (RCMS)

The Remote Cryptographic Management System (RCMS) provides monitoring control and key delivery to dispersed stations over TCP/IP networks to greatly enhance access to remote locations, lower travel requirements and improve visibility of system operations. Using a net-centric approach to provide secure, remote cryptographic system management, RCMS includes a software controller that provides key management capability and allows the operator to remotely load keys to the MIDS terminals over a secure Ethernet LAN connection.

Contact us to learn more

Cyber Solutions from Ultra

Sign up for download access

Please submit your details below to access our downloads.

I'm happy for you to contact me

View our privacy policy
Not now