List of AWS Key Management Service Integrations

This is a list of platforms and tools that integrate with AWS Key Management Service. This list is updated as of November 2025.

  • 1
    Leader badge
    Amazon Web Services (AWS) Reviews & Ratings

    Amazon Web Services (AWS)

    Amazon

    Empower your innovation journey with unmatched cloud solutions.
    Amazon Web Services (AWS) is a global leader in cloud computing, providing the broadest and deepest set of cloud capabilities on the market. From compute and storage to advanced analytics, AI, and agentic automation, AWS enables organizations to build, scale, and transform their businesses. Enterprises rely on AWS for secure, compliant infrastructure while startups leverage it to launch quickly and innovate without heavy upfront costs. The platform’s extensive service catalog includes solutions for machine learning (Amazon SageMaker), serverless computing (AWS Lambda), global content delivery (Amazon CloudFront), and managed databases (Amazon DynamoDB). With the launch of Amazon Q Developer and AWS Transform, AWS is also pioneering the next wave of agentic AI and modernization technologies. Its infrastructure spans 120 availability zones in 38 regions, with expansion plans into Saudi Arabia, Chile, and Europe’s Sovereign Cloud, guaranteeing unmatched global reach. Customers benefit from real-time scalability, security trusted by the world’s largest enterprises, and automation that streamlines complex operations. AWS is also home to the largest global partner network, marketplace, and developer community, making adoption easier and more collaborative. Training, certifications, and digital courses further support workforce upskilling in cloud and AI. Backed by years of operational expertise and constant innovation, AWS continues to redefine how the world builds and runs technology in the cloud era.
  • 2
    QSE Reviews & Ratings

    QSE

    QSE Group

    Future-proof cybersecurity solutions for a quantum-safe world.
    QSE Group specializes in providing quantum-proof data protection solutions that address the growing threat of cyberattacks, including those from future quantum computing technologies. Their decentralized cloud storage platform offers immutable data protection, ensuring continuous access without the risk of over-encryption from ransomware. Through their proprietary encryption technology and Entropy as a Service (EaaS), QSE delivers true randomness for secure key generation, making data breaches virtually impossible. The system is designed to integrate smoothly with existing infrastructures, minimizing disruption while maximizing security. QSE’s services are scalable, supporting businesses of all sizes with secure, high-performance cloud storage and quantum-resilient encryption solutions. By offering flexible API access and a straightforward implementation process, QSE ensures businesses can adapt to future threats without needing significant infrastructure changes. With their focus on quantum-resilient encryption, QSE is providing the long-term security businesses need in the face of ever-evolving cyber risks.
  • 3
    iText Reviews & Ratings

    iText

    Apryse

    Unlock powerful PDF capabilities with versatile, open-source solutions in Java & .NET (C#).
    Once operating under the name iText, we are now integrated with Apryse. Our advanced technology and extensive suite of tools enable Apryse to tackle even the most intricate projects, allowing you to progress more swiftly and efficiently. Dedicated to delivering feature-rich products that continuously improve, Apryse provides exceptional document solutions suitable for various applications and enterprise workflows. With iText as a part of Apryse, our clientele encompasses a significant portion of the Fortune 500, alongside numerous government entities and small businesses. Originating from the open source realm, we maintain a strong belief in the importance of open source software. Our primary library, iText 7 Community, along with earlier iterations—iText 5 and iText 2—are all accessible under the AGPL license. For clients who prefer not to adhere to AGPL and wish to keep their source code confidential, we also provide commercial licensing options. You may have encountered iText when you received a boarding pass for a flight, obtained a PDF invoice or receipt, or completed a form that generated a PDF document, among many other uses. To learn more, please visit the Apryse website and explore the various solutions we offer to enhance your document management processes.
  • 4
    AWS Nitro Enclaves Reviews & Ratings

    AWS Nitro Enclaves

    Amazon

    Secure isolation for sensitive data, enhancing trust and compliance.
    AWS Nitro Enclaves empowers users to create secure and isolated computing spaces that bolster the security of highly sensitive information, such as personally identifiable information (PII), healthcare records, financial data, and intellectual property, all within their Amazon EC2 instances. By employing the same Nitro Hypervisor technology that provides CPU and memory separation for EC2 instances, Nitro Enclaves significantly reduces the potential attack vectors for applications that process sensitive data. These enclaves offer a protected, confined, and isolated environment for running applications that are critical to security. Moreover, Nitro Enclaves includes cryptographic attestation to confirm that only authorized software is in operation and works in conjunction with the AWS Key Management Service to ensure that access to sensitive information is strictly limited to your enclaves. This combination of advanced security protocols allows organizations to effectively manage their most crucial data while adhering to rigorous regulatory standards. As a result, businesses can enhance their data protection strategies and improve trust among their clients and stakeholders.
  • 5
    Keycard Reviews & Ratings

    Keycard

    Keycard

    Empowering secure, seamless connections for modern digital identities.
    Keycard serves as a sophisticated identity and access management solution designed for the age of agent-driven technologies, ensuring secure interactions between AI agents, users, services, and APIs through real-time identity controls based on established policies. Rather than depending on fixed secrets, the platform produces dynamic access tokens that are short-lived, while also supporting federated identity systems to merge users, agents, and workloads within a decentralized authorization framework. Developers can utilize user-friendly SDKs compatible with major frameworks, allowing them to build applications that recognize agents without requiring deep expertise in identity and access management. The data architecture of the platform includes identity-validated agents, tasks, tools, and resources, which enable the creation of logical zones with context-aware permissions that can be audited. Moreover, security teams have the ability to design deterministic, task-specific policies that define who—whether user or agent—has the authority to execute particular tasks on certain resources under specific conditions, promoting full transparency in access management. This all-encompassing strategy not only bolsters security measures but also streamlines operational processes across diverse systems, ultimately fostering a more integrated technological environment. Through its innovative approach, Keycard paves the way for a future where secure access is paramount for both human and AI interactions.
  • Previous
  • You're on page 1
  • Next