Keyfactor Command Features
What are the features of Keyfactor Command?
Functionality
- Certificate Discovery
- Expiration Monitoring
- Automated Certificate Operations
- Policy And Role-Based Access Controls
- Workflow
- Protocol Support
- Reporting And Search
- Audit And Enforcement
- Key Storage
Administration
- Management Console
Availability
- API/Integrations
Keyfactor Command Categories on G2
Filter for Features
Functionality
Durability | Logs and stores multiple copies and versions of master keys. | Not enough data | |
Envelope Encryption | Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK). | Not enough data | |
Automation | Allows administrative control over automated tasks related to key management, storage and distribution. | Not enough data | |
Certificate Discovery | Automatic discovery of certificates directly from Certificate Authorities, network scanning, and deep discovery methods. 23 reviewers of Keyfactor Command have provided feedback on this feature. | 77% (Based on 23 reviews) | |
Expiration Monitoring | As reported in 25 Keyfactor Command reviews. Monitors and notifies administrators of certificate expiration dates. | 87% (Based on 25 reviews) | |
Automated Certificate Operations | As reported in 24 Keyfactor Command reviews. Automates certificate deployment, renewals, and revocations. | 76% (Based on 24 reviews) | |
Policy And Role-Based Access Controls | Based on 21 Keyfactor Command reviews. Offers granular permissions for assigning certificate owners and other roles. | 83% (Based on 21 reviews) | |
Workflow | Offers built-in workflows to assign ownership and management of certificates. This feature was mentioned in 20 Keyfactor Command reviews. | 74% (Based on 20 reviews) | |
Protocol Support | Offers industry-standard protocols such as CMP, ACME, and SCEP. This feature was mentioned in 20 Keyfactor Command reviews. | 75% (Based on 20 reviews) | |
Reporting And Search | Based on 23 Keyfactor Command reviews. Offers template and custom reports and search functionality. | 80% (Based on 23 reviews) | |
Audit And Enforcement | Based on 22 Keyfactor Command reviews. Enforces certificate policies and provides audit trails of user and certificate activities to detect issues. | 80% (Based on 22 reviews) | |
Key Storage | Allows keys to be stored on end devices, on the platform, or hardware security modules. 16 reviewers of Keyfactor Command have provided feedback on this feature. | 80% (Based on 16 reviews) |
Administration
Auditing | Documents access and alterations of the database for analytics and reporting. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Management Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks. This feature was mentioned in 10 Keyfactor Command reviews. | 82% (Based on 10 reviews) |
Availability
API/Integrations | Integrates with third-party software to provide other features and expand functionality. This feature was mentioned in 10 Keyfactor Command reviews. | 88% (Based on 10 reviews) | |
Service Integration | Integrates with major cloud service provider offerings for simplified management and distribution. | Not enough data | |
Regional Support | Supports key distribution across multi-regions to increase availability. | Not enough data | |
Scalability | Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality. | Not enough data |