Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine Endpoint Central Reviews & Ratings
    2,458 Ratings
    Company Website
  • Airlock Digital Reviews & Ratings
    35 Ratings
    Company Website
  • Google Cloud Platform Reviews & Ratings
    60,425 Ratings
    Company Website
  • Iru Reviews & Ratings
    1,457 Ratings
    Company Website
  • Jama Connect Reviews & Ratings
    369 Ratings
    Company Website
  • The Asset Guardian EAM (TAG) Reviews & Ratings
    22 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • Epicor Kinetic Reviews & Ratings
    510 Ratings
    Company Website
  • ARGOS Identity Reviews & Ratings
    8 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    374 Ratings
    Company Website

What is Keyfactor Command for IoT?

Keyfactor Command for IoT is a robust identity management platform designed to secure connected devices across industries, including automotive, medical, and manufacturing. The platform provides end-to-end IoT security by automating certificate lifecycle management from manufacturing through to the device's end-of-life. By issuing and managing trusted device identities, Keyfactor Command for IoT ensures devices remain secure, with centralized visibility and control. It also supports automated certificate provisioning and revocation, making it easier for organizations to maintain compliance and prevent security breaches. Through integration with cloud services and IoT platforms like Azure IoT Hub and Google Cloud IoT Core, businesses can seamlessly scale their IoT security operations. With crypto-agility, the platform adapts to emerging vulnerabilities, evolving algorithms, and changing regulations, ensuring continuous device protection. Keyfactor Command for IoT also offers one-click revocation and automated certificate renewals, simplifying security operations and reducing the risk of device compromises. Whether deployed in the cloud or on-premises, this solution ensures end-to-end protection and compliance for businesses managing large-scale IoT environments.

What is CENTRI Protected Sessions?

Ensure the protection of your IoT data from its inception to its ultimate use, safeguarding it throughout every phase of its lifecycle. The innovation of Protected Sessions transforms data security by allowing secure two-way communication while overcoming the limitations of different network protocols and varied IoT settings. Specifically crafted for the IoT environment, session lifecycles cater to low-power microcontroller units (MCUs) functioning on energy-efficient networks with intermittent connectivity, thus enabling Protected Sessions to maintain the reliability of your communication channels for timeframes that can range from just seconds to several months. Utilizing strong, industry-standard encryption, CENTRI Protected Sessions is optimized for devices with limited resources, integrating data compression and a small footprint to guarantee both security and effective operation between endpoint devices and cloud systems. By enabling secure two-way communication between your IoT devices and application servers or cloud infrastructures, Protected Sessions bolsters your IoT framework against potential threats. This all-encompassing strategy not only improves the dependability of IoT communications but also simplifies the integration process across a multitude of applications and services, ultimately enhancing the overall security posture of the IoT ecosystem. Additionally, the implementation of these secure sessions fosters greater trust between users and IoT systems, paving the way for more widespread adoption of IoT technologies.

Media

Media

Integrations Supported

AWS Certificate Manager
Axonius
Azure IoT Hub
Azure Key Vault
Certificate Authority Service
Datacard ID Works
Docker
F5 BIG-IP
IdenTrust Trust Sign
Istio
Jenkins
Keyfactor EJBCA
Kubernetes
Microsoft Azure
Microsoft Intune
Sectigo
ServiceNow
Tetrate
ThingWorx
wolfSSL

Integrations Supported

AWS Certificate Manager
Axonius
Azure IoT Hub
Azure Key Vault
Certificate Authority Service
Datacard ID Works
Docker
F5 BIG-IP
IdenTrust Trust Sign
Istio
Jenkins
Keyfactor EJBCA
Kubernetes
Microsoft Azure
Microsoft Intune
Sectigo
ServiceNow
Tetrate
ThingWorx
wolfSSL

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Keyfactor

Date Founded

2001

Company Location

United States

Company Website

www.keyfactor.com/products/command-iot/

Company Facts

Organization Name

CENTRI Technology

Date Founded

2010

Company Location

United States

Company Website

www.centritechnology.com/product-iot-data-security/

Categories and Features

Popular Alternatives

Alliance Key Manager Reviews & Ratings

Alliance Key Manager

Townsend Security

Popular Alternatives

Azure IoT Hub Reviews & Ratings

Azure IoT Hub

Microsoft
CertSecure Manager Reviews & Ratings

CertSecure Manager

Encryption Consulting LLC