Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • TruGrid Reviews & Ratings
    65 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    119 Ratings
    Company Website
  • YouTestMe Reviews & Ratings
    36 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    125 Ratings
    Company Website
  • Union Impact Reviews & Ratings
    Company Website
  • ClouDNS Reviews & Ratings
    143 Ratings
    Company Website
  • FMIS Asset Management Reviews & Ratings
    27 Ratings
    Company Website
  • Device42 Reviews & Ratings
    173 Ratings
    Company Website
  • RunMyJobs by Redwood Reviews & Ratings
    244 Ratings
    Company Website
  • Ango Hub Reviews & Ratings
    15 Ratings
    Company Website

What is HID IdenTrust?

Effectively oversee the complete lifecycle of certificates within your network, applicable to both on-premise and cloud-centric Public Key Infrastructure (PKI) environments. Transition effortlessly from your existing certificate authority by adopting policy-driven automated mechanisms for the issuance, renewal, and revocation of certificates, which eliminates the potential for human error often associated with manual tasks. As organizations increasingly rely on PKI to protect machines, devices, and user access through keys and digital certificates, HID IdenTrust, in partnership with Keyfactor, delivers an efficient solution for PKI and extensive automation in certificate lifecycle management. HID IdenTrust provides a cloud-managed PKI service capable of issuing public, private, and U.S. Government interoperable (FBCA) digital certificates, significantly enhancing the security of websites, network infrastructures, IoT devices, and employee identities. Additionally, you can identify all certificates present within both network and cloud environments through real-time inventories of public and private Certificate Authorities (CAs), as well as utilizing distributed SSL/TLS discovery tools and direct connections to key and certificate repositories, ensuring thorough visibility and oversight. This comprehensive strategy not only fortifies security but also enhances operational effectiveness throughout the organization, ultimately leading to a more resilient digital ecosystem.

What is GaraSign?

Organizations today have access to a diverse array of exceptional enterprise security tools. These tools can be deployed either on-premises or as cloud-based services, with some solutions offering a blend of both methods. The main challenge that companies face is not the lack of available tools or solutions, but the struggle to achieve smooth integration of privileged access management systems within a cohesive platform for monitoring and auditing. GaraSign offers a robust solution that allows organizations to securely and efficiently connect their security systems without disrupting their existing workflows. By pinpointing and highlighting shared characteristics, GaraSign helps streamline and consolidate the supervision of essential enterprise functions, including privileged access management (PAM), privileged identity management, secure software development, code signing, data protection, PKI & HSM solutions, DevSecOps, and more. As a result, it becomes crucial for security leaders in organizations to prioritize data security management, PAM, and privileged identity management in their strategic planning. Furthermore, the capacity to integrate these diverse tools not only enhances operational efficiency but also strengthens risk management practices across the organization. This integration ultimately fosters a more resilient security posture, enabling businesses to navigate the complexities of today's threat landscape with greater confidence.

Media

Media

Integrations Supported

Microsoft 365
Acceptto Zero Trust Identity (CIAM)
Amazon Web Services (AWS)
Android
Cohesion
Debian
ERMES
Entrust Certificate Hub
Git
Google Cloud Platform
HashiCorp Vault
Intercede MyID
Java
Kastle
New Era
Thales Sentinel
VideoWatch
VisitorWatch
npm

Integrations Supported

Microsoft 365
Acceptto Zero Trust Identity (CIAM)
Amazon Web Services (AWS)
Android
Cohesion
Debian
ERMES
Entrust Certificate Hub
Git
Google Cloud Platform
HashiCorp Vault
Intercede MyID
Java
Kastle
New Era
Thales Sentinel
VideoWatch
VisitorWatch
npm

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

HID

Date Founded

1991

Company Location

United States

Company Website

www.hidglobal.com/solutions/identity-management/digital-certificate-lifecycle-management

Company Facts

Organization Name

Garantir

Company Location

United States

Company Website

garantir.io/garasign/

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

CodeSign Secure Reviews & Ratings

CodeSign Secure

Encryption Consulting LLC
Secardeo TOPKI Reviews & Ratings

Secardeo TOPKI

Secardeo