BK Software

BK Software

Intrinsic ID
+
+

Related Products

  • ManageEngine Endpoint Central
    2,458 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Google Cloud Platform
    60,425 Ratings
    Visit Website
  • Iru
    1,457 Ratings
    Visit Website
  • Cloudflare
    1,903 Ratings
    Visit Website
  • Keeper Security
    1,740 Ratings
    Visit Website
  • RemotePeople
    574 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • ARGOS Identity
    8 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    119 Ratings
    Visit Website

About

The accelerating expansion of the Internet of Things brings with it a comparably expanding threat model. The growing number of endpoints require strong identities as the foundation of trust to establish and scale robust security. BK is a secure root key generation and management software solution for IoT security that allows device manufacturers to secure their products with an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. Since BK is a software implementation of SRAM PUF, it is the only hardware entropy source option for securing IoT products that does not need to be loaded at silicon fabrication. It can be installed later in the supply chain, and even remotely retrofitted on deployed devices. This enables a never-before-possible remote “brownfield” installment of a hardware root of trust and paves the way for scaling the IoT to billions of devices.

About

Authenticate users and machines and protect PKI – seamlessly across all locations and devices. Create virtual enclaves for mobile and for desktop with maximum security and without sacrificing the user experience. Authenticate user access and identify simply and securely with CORE virtual secure enclave SDK. Mobile, desktop, or server-side enabled – CORE keeps credentials safe even if the user’s personal device is compromised. Build virtual smartcards, protect mobile apps, and more with pure software agility. Integrate strong two-factor and multi-factor authentication into a mobile app – no hardware, no one-time password, no software token required. Replace traditional smartcards with virtual ones to authenticate employees and reduce operational strain and total cost of ownership. Protect machine and human electronic identities and the root certificate authority which oversees them. Protecting PII with maximum security, best user experience.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Secure root key generation and management software solution for IoT security

Audience

Enterprises in need of an authentication solution to authenticate and identify simply and securely their users access

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Intrinsic ID
Founded: 2008
United States
www.intrinsic-id.com/products/bk-software/

Company Information

Unbound Security
Founded: 2014
United States
www.unboundsecurity.com/solutions/identity-security/

Alternatives

Alternatives

KeyScaler

KeyScaler

Device Authority
Azure Sphere

Azure Sphere

Microsoft
Symantec VIP

Symantec VIP

Broadcom
Xage

Xage

Xage Security

Categories

Categories

Integrations

360 Monitoring
Enveil

Integrations

360 Monitoring
Enveil
Claim BK Software and update features and information
Claim BK Software and update features and information
Claim Unbound CORE Identity Security and update features and information
Claim Unbound CORE Identity Security and update features and information