Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine Endpoint Central Reviews & Ratings
    2,699 Ratings
  • Airlock Digital Reviews & Ratings
    35 Ratings
  • Google Cloud Platform Reviews & Ratings
    60,586 Ratings
  • Iru Reviews & Ratings
    1,278 Ratings
  • Jama Connect Reviews & Ratings
    376 Ratings
  • The Asset Guardian EAM (TAG) Reviews & Ratings
    22 Ratings
  • Josys Reviews & Ratings
    204 Ratings
  • Robin by Atera Reviews & Ratings
    519 Ratings
  • Epicor Kinetic Reviews & Ratings
    512 Ratings
  • DriveStrike Reviews & Ratings
    24 Ratings

What is Keyfactor Command for IoT?

Keyfactor Command for IoT is a robust identity management platform designed to secure connected devices across industries, including automotive, medical, and manufacturing. The platform provides end-to-end IoT security by automating certificate lifecycle management from manufacturing through to the device's end-of-life. By issuing and managing trusted device identities, Keyfactor Command for IoT ensures devices remain secure, with centralized visibility and control. It also supports automated certificate provisioning and revocation, making it easier for organizations to maintain compliance and prevent security breaches. Through integration with cloud services and IoT platforms like Azure IoT Hub and Google Cloud IoT Core, businesses can seamlessly scale their IoT security operations. With crypto-agility, the platform adapts to emerging vulnerabilities, evolving algorithms, and changing regulations, ensuring continuous device protection. Keyfactor Command for IoT also offers one-click revocation and automated certificate renewals, simplifying security operations and reducing the risk of device compromises. Whether deployed in the cloud or on-premises, this solution ensures end-to-end protection and compliance for businesses managing large-scale IoT environments.

What is BK Software?

The swift expansion of the Internet of Things (IoT) presents a more intricate threat environment that demands attention. With an increasing number of connected devices, the importance of establishing strong identities becomes vital to build trust and guarantee that effective security measures are in place. BK offers a secure software solution specifically designed for the generation and management of root keys, enhancing IoT security by allowing manufacturers to create unique identities for their products internally, thus avoiding the costs associated with specialized security hardware. Leveraging SRAM PUF technology, BK emerges as the only solution that provides a hardware entropy source without requiring integration during the silicon manufacturing process. This adaptability enables installation at any stage in the supply chain and even allows for retrofitting on devices that are already in use. As a result, BK paves the way for a groundbreaking method to establish a remote hardware root of trust, which is crucial for scaling the IoT landscape to support billions of devices while preserving security integrity. This transformative capability not only addresses existing IoT security challenges but also sets the stage for future innovations in device security management.

Media

Media

Integrations Supported

Axonius
Azure IoT Hub
Azure Key Vault
Certificate Authority Service
Datacard ID Works
DigiCert Secure Site
Docker
F5 BIG-IP
HashiCorp Vault
IdenTrust Trust Sign
Istio
Jenkins
Keyfactor EJBCA
Kubernetes
Microsoft Intune
ServiceNow
Symantec Endpoint Protection
Tetrate
ThingWorx
wolfSSL

Integrations Supported

Axonius
Azure IoT Hub
Azure Key Vault
Certificate Authority Service
Datacard ID Works
DigiCert Secure Site
Docker
F5 BIG-IP
HashiCorp Vault
IdenTrust Trust Sign
Istio
Jenkins
Keyfactor EJBCA
Kubernetes
Microsoft Intune
ServiceNow
Symantec Endpoint Protection
Tetrate
ThingWorx
wolfSSL

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Keyfactor

Date Founded

2001

Company Location

United States

Company Website

www.keyfactor.com/products/command-iot/

Company Facts

Organization Name

Intrinsic ID

Date Founded

2008

Company Location

United States

Company Website

www.intrinsic-id.com/products/bk-software/

Categories and Features

Popular Alternatives

Alliance Key Manager Reviews & Ratings

Alliance Key Manager

Townsend Security

Popular Alternatives

CertSecure Manager Reviews & Ratings

CertSecure Manager

Encryption Consulting LLC
Azure Sphere Reviews & Ratings

Azure Sphere

Microsoft