Introducing G2.ai, the future of software buying.Try now
Keyfactor Command for IoT
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Keyfactor Command for IoT Alternatives

Egnyte
(1,033)
4.4 out of 5

Keyfactor Command for IoT Reviews & Product Details

Keyfactor Command for IoT Overview

What is Keyfactor Command for IoT?

Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and development to end-of-life, Keyfactor Control makes it easy to embed certificate-based identities into each device at scale, encrypt data at rest and in transit, secure firmware updates, and manage cryptography for large-scale IoT deployments.

Keyfactor Command for IoT Details
Show LessShow More
Product Description

Keyfactor Command for IoT is designed to enable IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and development to end-of-life, Keyfactor Command IoT makes it easy to embed certificate-based identities into each device at scale, encrypt data at rest and in transit, secure firmware updates, and manage cryptography on devices.


Seller

Keyfactor

Description

Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale — and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. For more, visit keyfactor.com or follow @keyfactor.

Overview Provided by:
Senior Product Marketing Manager at Keyfactor

Recent Keyfactor Command for IoT Reviews

DEEPAK K.
DK
DEEPAK K.Enterprise (> 1000 emp.)
5.0 out of 5
"Best IoT Software Solutions to Secure IoT Devices"
The Best part of this software is it will provide best solution to secure IoT Device and it has the best feature to process data with in a system a...
Arup Kumar P.
AP
Arup Kumar P.Enterprise (> 1000 emp.)
4.5 out of 5
"Secure your IOT devices with this software"
The edge devices that the customers use are often on the verge of the potential risk of security breaches because they are either not regularly upd...

Keyfactor Command for IoT Media

Answer a few questions to help the Keyfactor Command for IoT community
Have you used Keyfactor Command for IoT before?
Yes

2 Keyfactor Command for IoT Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Keyfactor Command for IoT Reviews
4.8 out of 5
2 Keyfactor Command for IoT Reviews
4.8 out of 5
G2 reviews are authentic and verified.
Arup Kumar P.
AP
Software Engineer II
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
Rating Updated ()
What do you like best about Keyfactor Command for IoT?

The edge devices that the customers use are often on the verge of the potential risk of security breaches because they are either not regularly updated with the latest software or the state-of-the-art software updates have not been installed. Often data breaches occur from these edge devices or thin clients. Albeit the processing of data is done in a central system with the required amount of security, the IoT devices are the spikes for collecting data and a security breach at that point may prove to be very costly. To prevent that we decided to try out a specific security software curated for our needs and this software provides the advantages and facilities at an effective price. Review collected by and hosted on G2.com.

What do you dislike about Keyfactor Command for IoT?

Generally, security solutions are like wine, the more it ages and stands the test of time, the more reliable it becomes. This software is new in the security domain and does not come with that age-old credibility but the domain they are offering security to is also a relatively nascent domain. So it may be worth trying for a couple of years. The updates they are releasing or planning to release must be well spread out. It will help the consumers send notifications beforehand and follow-ups needed after the update has been released. Review collected by and hosted on G2.com.

What problems is Keyfactor Command for IoT solving and how is that benefiting you?

With the increase in WFH culture since the start of the pandemic, people prefer to work from their native places and connect devices with one another. This software helped provide security to the company-owned devices, so there is no breach of security or leakage of valuable data from any spike points. Review collected by and hosted on G2.com.

DEEPAK K.
DK
Manager
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
Rating Updated ()
What do you like best about Keyfactor Command for IoT?

The Best part of this software is it will provide best solution to secure IoT Device and it has the best feature to process data with in a system and out of the system. On a Trail base we decided use this solution to IoT Devices and this software has best solution and service. Review collected by and hosted on G2.com.

What do you dislike about Keyfactor Command for IoT?

Like the best solution, this Keyfactor provides like the bugs are getting raised which need to be cleared by Solution provider. Review collected by and hosted on G2.com.

What problems is Keyfactor Command for IoT solving and how is that benefiting you?

It Can provide best solution for Remote Workers and secure Company Data. Review collected by and hosted on G2.com.

There are not enough reviews of Keyfactor Command for IoT for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,033)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(346)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
3
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.3
(107)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
4
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(103)
5
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
6
Akeyless Platform Logo
Akeyless Platform
4.5
(76)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
7
AWS IoT Device Defender Logo
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
8
Azure Key Vault Logo
Azure Key Vault
4.4
(57)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
9
Doppler secrets management platform Logo
Doppler secrets management platform
4.8
(57)
Doppler’s developer-first secrets management platform empowers teams to seamlessly orchestrate, govern, and control secrets across any environment at scale.
10
DoveRunner Logo
DoveRunner
4.7
(51)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
Show More