Use Cloak to generate, protect, and operate keys behind managed HSM infrastructure without building and maintaining your own HSM fleet. Run signing, verification, encryption, decryption, ECDH, public-key retrieval, audit logging, and policy enforcement from one secure platform.
kms-ws-agent
Developers and SaaS TeamsShip secure key operations without owning HSM infrastructureCall KMS APIs for signing, verification, encryption, decryption, and ECDH while keeping sensitive keys inside a managed HSM-backed platform. View Plans |
Security and Enterprise TeamsCentralize control, isolation, and auditabilityEnforce tenant boundaries, review cryptographic activity, manage master key workflows, and support both human users and automated agents from one control plane. Talk to Sales |
Cloak KMS is designed for teams that need stronger key protection than software-only secrets storage, but do not want the cost and operational burden of deploying traditional HSM infrastructure on their own.
Generate keys, sign, verify, encrypt, decrypt, derive via ECDH, and retrieve public keys through one API surface.
Use tenant-aware authorization, policy enforcement, audit logging, and managed master key lifecycle workflows to reduce operational risk.
Issue scoped credentials to developers and AI agents, expose approved tools through MCP, and inspect usage from the console.
Connect local smartcard and PKCS#11-backed hardware using kms-ws-agent while keeping orchestration and policy central in the cloud.
Use the console, safe Try It tooling, and straightforward REST patterns to move from evaluation to production faster.
Cloak KMS can back broader document security, signing, and secure sharing workflows across the rest of the Cloak platform.
A serious control surface, not a gimmick
Cloak KMS supports the same strong cryptographic platform for human users, applications, and AI agents. Instead of embedding raw secrets into automation, teams can grant scoped credentials and allow approved operations such as listing keys, reading public keys, signing, and verification.
MCP support, Agent Access controls, and usage tracking let you expose cryptographic capabilities to agentic systems without giving away unrestricted access to private key material.

Protect signing keys, service encryption keys, and identity workflows with HSM-backed operations while keeping product teams focused on shipping software instead of operating hardware.

Centralize control over key usage, isolate tenants, review audit logs, and apply policy controls for sensitive workloads that cannot rely on ordinary secrets management alone.

Connect a local smartcard HSM through kms-ws-agent and let the Cloak control plane coordinate approvals, policy, and cryptographic workflows without forcing hardware into the cloud.

Give AI agents controlled access to approved key operations for signing, verification, and public-key workflows while preserving separation of duties and visibility over every action.
Cloak builds security software for organizations that need stronger control over cryptographic keys, sensitive files, and signing workflows. Our work has been tested in demanding environments across government, regulated industries, and enterprise software deployments.
For product, pricing, and architecture discussions
Use Cloak KMS if you need stronger cryptographic key protection, better operational control, or a credible way to extend signing and verification workflows to applications and AI agents.
We can help with managed HSM-backed keys, local smartcard-backed integrations, enterprise policy controls, or rollout planning for developer and security teams.