CyberArk Machine Identity SecurityCyberArk
|
KeyWinCreone
|
|||||
Related Products
|
||||||
About
CyberArk Machine Identity Security provides comprehensive protection for all machine identities, including secrets, certificates, workload identities, and SSH keys. The platform offers centralized visibility and scalable automation to secure these non-human identities throughout their lifecycle. Designed to help organizations reduce risk and maintain resilience, CyberArk ensures secure machine identity management across on-premises, cloud, and hybrid environments.
|
About
KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Security teams, DevOps professionals, and IT administrators seeking a comprehensive, automated solution to manage and protect machine identities and non-human credentials across complex, multi-cloud environments
|
Audience
Companies seeking a administrative tool for securely managing keys and valuables
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCyberArk
Founded: 1999
United States
www.cyberark.com/products/machine-identity-security/
|
Company InformationCreone
Sweden
www.creone.com/products/keywin/keywin6/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
Key Tracking Features
Access Controls/Permissions
Alerts/Notifications
Audit Trail
Barcoding / RFID
Check-in / Check-out
Key Holder Management
Lock Management
Master Key Management
Overdue Tracking
|
|||||
Integrations
A10 Defend DDoS Mitigator
Axiad Cloud
Certificate Authority Service
Check Point IPS
Check Point Infinity
Entrust Identity Enterprise
Entrust Identity Essentials
GigaSECURE
KeyScaler
Multi-Domain Security Management
|
Integrations
A10 Defend DDoS Mitigator
Axiad Cloud
Certificate Authority Service
Check Point IPS
Check Point Infinity
Entrust Identity Enterprise
Entrust Identity Essentials
GigaSECURE
KeyScaler
Multi-Domain Security Management
|
|||||
|
|
|