+
+

Related Products

  • Carbide
    88 Ratings
    Visit Website
  • Guardz
    118 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • HSI Donesafe
    155 Ratings
    Visit Website
  • Cloudflare
    2,002 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Admin By Request Endpoint Privilege Management
    84 Ratings
    Visit Website
  • GOAT Risk
    68 Ratings
    Visit Website

About

In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. More than 190 enterprises worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations.

About

Manage team SSH keys across clouds and continents using Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or custom scripts. Userify works smoothly across multiple, geographically isolated clouds and high-latency networks. Hardened. Curve 25519 and bcrypt. PCI-DSS and HIPAA Compliant. AICPA SOC-2 Type 1 certified. Deployed by more than 3,500 companies on every populated continent. Userify SSH Key logins are passwordless: More secure. More convenient. Userify is the only key manager designed to operate on the open Internet. How do you de-provision admins when they leave? With Userify, it's one click. Userify is AICPA SOC-2 Type 1 certified and has achieved PCI-DSS and HIPAA compliance. Userify helps you get compliant with PCI-DSS Requirement 8, even on cloud systems, protect PII, and ban ec2-user forever. Userify helps you get compliant with the HIPAA Security Rule and protect critical healthcare systems and PHI by limiting internal access and authority.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations in need of an information security management system

Audience

Enterprises interested in a privileged access management solution to manage team SSH keys across clouds

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cetbix
Founded: 2019
United Kingdom
www.cetbix.com/products/cetbixismssoftware

Company Information

Userify
Founded: 2012
United States
userify.com

Alternatives

Alternatives

Upland InterFAX

Upland InterFAX

Upland Software
TrustCloud

TrustCloud

TrustCloud Corporation
Plum Voice Cloud IVR

Plum Voice Cloud IVR

The Plum Group
iSecurity Field Encryption

iSecurity Field Encryption

Raz-Lee Security

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Integrated Risk Management Features

Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management

Integrations

AWS CloudFormation
Active Directory
Akamai
Amazon Web Services (AWS)
Ansible
CetDoc
Chef
Cisco Secure Cloud Analytics
IBM Cloud
Intuit Field Service Management
NetScaler
Puppet Enterprise
SALT CRM
Snagajob
Terraform
Trimble Business Center
Verizon Cloud
XMAP

Integrations

AWS CloudFormation
Active Directory
Akamai
Amazon Web Services (AWS)
Ansible
CetDoc
Chef
Cisco Secure Cloud Analytics
IBM Cloud
Intuit Field Service Management
NetScaler
Puppet Enterprise
SALT CRM
Snagajob
Terraform
Trimble Business Center
Verizon Cloud
XMAP
Claim Cetbix GRC & ISMS and update features and information
Claim Cetbix GRC & ISMS and update features and information
Claim Userify and update features and information
Claim Userify and update features and information