Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Keeper Security Reviews & Ratings
    1,697 Ratings
    Company Website
  • Fastly Reviews & Ratings
    900 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    178 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    533 Ratings
    Company Website
  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • StrongDM Reviews & Ratings
    92 Ratings
    Company Website
  • ScalaHosting Reviews & Ratings
    2,235 Ratings
    Company Website
  • HostZealot Reviews & Ratings
    287 Ratings
    Company Website
  • DNSimple Reviews & Ratings
    64 Ratings
    Company Website
  • Hostinger Reviews & Ratings
    52,103 Ratings
    Company Website

What is Keyfactor Command?

Join the leading enterprises that are leveraging a robust and expansive managed PKI as-a-Service. Enjoy the advantages of Public Key Infrastructure without the complexities that often accompany it. Whether your aim is to enhance network security, protect confidential data, or ensure the integrity of connected devices, PKI stands as a dependable framework for building trust. Yet, creating and sustaining your own PKI system can be a complex and expensive endeavor. Succeeding in this domain is crucial; however, it comes with various obstacles. Finding and retaining qualified experts, adhering to industry standards, and managing the costs of essential hardware and software for a reliable PKI framework are major challenges, especially when weighing the potential risks of failure. Optimize your inventory management and implement proactive notifications to alert users about impending expirations or compliance challenges related to certificates before they develop into significant issues. Moreover, utilizing managed PKI services not only enables you to concentrate on your primary business goals but also alleviates the operational challenges tied to the protection of your digital resources. Ultimately, embracing this innovative approach ensures that your organization remains secure and compliant in an increasingly digital landscape.

What is Dogtag?

The Dogtag Certificate System is an advanced, open-source Certificate Authority (CA) tailored for enterprise environments. Its proven reliability and stability have been demonstrated through extensive use in real-world scenarios. This system adeptly oversees all phases of the certificate lifecycle, incorporating features such as key archival, Online Certificate Status Protocol (OCSP), and smartcard management, among others. Organizations can access the Dogtag Certificate System free of charge and complete the installation process in less than an hour, making it a practical option for various entities. Dogtag provides a comprehensive range of technologies designed to support large-scale Public Key Infrastructure (PKI) implementations. Its offerings include the issuance, revocation, and retrieval of certificates, as well as the creation and distribution of Certificate Revocation Lists (CRLs). Moreover, the system incorporates customizable Certificate Profiles and accommodates the Simple Certificate Enrollment Protocol (SCEP). It also features a Local Registration Authority (LRA) to streamline organizational authentication while ensuring adherence to established policies. Among its diverse capabilities are encryption key archival and recovery, along with thorough smartcard lifecycle management. Additionally, it includes functionalities for managing token profiles, enrollment processes, on-hold actions, key recovery, and format management. Users can engage in face-to-face enrollment through a specialized interface designed for security officers. Overall, the Dogtag Certificate System serves as an essential resource for organizations looking to enhance their digital security frameworks, providing both flexibility and a robust feature set to meet evolving security demands.

Media

Media

Integrations Supported

Datacard Secura
Entrust Certificate Hub
JProfiler
Keyfactor EJBCA
Red Hat Cloud Suite
Red Hat OpenShift
wolfSSL

Integrations Supported

Datacard Secura
Entrust Certificate Hub
JProfiler
Keyfactor EJBCA
Red Hat Cloud Suite
Red Hat OpenShift
wolfSSL

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Keyfactor

Date Founded

2001

Company Location

United States

Company Website

www.keyfactor.com/platform/keyfactor-command/

Company Facts

Organization Name

Dogtag

Date Founded

2008

Company Location

United States

Company Website

www.dogtagpki.org/wiki/PKI_Main_Page

Categories and Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

Keyfactor EJBCA Reviews & Ratings

Keyfactor EJBCA

Keyfactor
Secardeo TOPKI Reviews & Ratings

Secardeo TOPKI

Secardeo
AppViewX CERT+ Reviews & Ratings

AppViewX CERT+

AppViewX