Universal SSH Key Manager

Universal SSH Key Manager

SSH Communications Security
+
+

Related Products

  • Blockdaemon
    2 Ratings
    Visit Website
  • IUX
    905 Ratings
    Visit Website
  • Securden Password Vault
    40 Ratings
    Visit Website
  • Keeper Security
    1,751 Ratings
    Visit Website
  • CoinStats
    101,067 Ratings
    Visit Website
  • YouHodler
    28 Ratings
  • Proton VPN
    41,009 Ratings
    Visit Website
  • ND Wallet
    14 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Multiparty Computation (MPC) generates and uses keys in the form of distributed key shares – eliminating the existence of a complete key on any single device to eliminate single points of failure. Sepior provides next-generation key management technology that allows businesses to transact online with institutional-grade cryptocurrency wallets, private blockchains, and SaaS applications. Sepior is pioneering the industry transition to threshold cryptography, using multiparty computation (MPC) to address the need for data confidentiality, integrity, and availability of new and emerging online services. For cryptocurrency exchange providers and other institutional traders, Sepior solves the problem of securing the private keys associated with cryptocurrency stored in wallets, facilitating institutional-grade of wallet security for service providers and their customers. Sepior’s approach also dramatically reduces mining workloads and the complexity of on-chain operations.

About

Secure your business with a proven zero trust key(less) management solution. Discover and manage all your SSH keys and accounts to mitigate risks. Reduce complexity with automation features. Never fail an IT audit again due to unmanaged SSH keys. SSH keys are credentials just like passwords but 10 times more common and unmanaged. We scanned a financial institution's environment. That death star is the result. Their Privileged Access Management (PAM) security controls were being bypassed with unauthorized, test-to-production, and application-to-application connections. SSH keys are complex and can easily go unmanaged. These unmanaged SSH keys are then highly sought after by malicious actors. With UKM, you remove security risks caused by ungoverned keys that might look legitimate to your existing security controls. With UKM, you manage and discover all authentication keys, key configurations, and SSH login files in a centralized, universal SSH key manager.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone looking for an MPC digital asset wallet solution

Audience

Teams searching for a tool to centralize and automate their key management operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Sepior
Founded: 2014
Denmark
sepior.com

Company Information

SSH Communications Security
Finland
www.ssh.com/products/universal-ssh-key-manager/

Alternatives

Alternatives

KeyScaler

KeyScaler

Device Authority
TrustVault

TrustVault

Trustology

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

CYBAVO

Integrations

CYBAVO
Claim Sepior and update features and information
Claim Sepior and update features and information
Claim Universal SSH Key Manager and update features and information
Claim Universal SSH Key Manager and update features and information