Alternatives to KeyScaler
Compare KeyScaler alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to KeyScaler in 2024. Compare features, ratings, user reviews, pricing, and more from KeyScaler competitors and alternatives in order to make an informed decision for your business.
-
1
Hacken
Hacken
Many web applications process sensitive data including user and financial information, making them of enormous interest to malicious attackers. As the complexity of web applications increases, the range of exploitable vulnerabilities will increase. This is why Hacken’s web penetration testing services are so crucial for our clients. We believe that security should be top priority for any kind of business. We provide knowledge and support to help businesses protect themselves. Hacken is delivering cybersecurity services for businesses of any scale and end customers around the world. While blockchains began life to facilitate the development of cryptocurrencies, they are now widely used across businesses for smart contracts, online transaction management, asset record management, and securing critical data. Acting as digital ledgers residing in a distributed infrastructure, they allow the secure storage and structuring of important information in a manner that ensures integrity. -
2
UBIRCH
UBIRCH
UBIRCH has rethought data security and is pursuing a revolutionary approach based on robust established cryptography and blockchain technology. The UBIRCH solution is easy to integrate into IoT platforms and other system environments, requires no additional hardware and consists of only two components: the Ubirch Nano Client and the Ubirch Trust Service. Before data is transferred from the physical to the digital world, we seal every single data packet directly at the point of data capture using robust cryptography and block chain technology. This creates an unalterable "chain of trust" that guarantees at source that IoT data is not manipulated, duplicated or deleted. The data can be verified by any recipient anytime, anywhere, just as if they were at source. One of the two components required for the UBIRCH solution is the Nano Client, a small and lightweight software library. -
3
EJBCA
Keyfactor
EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution. -
4
GK8
GK8
GK8 offers institutions an end-to-end platform for managing blockchain-based assets, including custody, DeFi, staking, NFT, CBDC, and tokenization support. GK8’s regulation-ready solution includes the world’s first ‘true’ Cold Vault that enables its clients to create, sign, and send secure blockchain transactions without internet connectivity. When paired with our propriety, patented MPC technology, which offers an unlimited number of automatic co-signers, the GK8 solution eliminates any single point of failure while transacting at scale. Both are managed by our policy engine combines best-in-class policy management technology with workflow automation. GK8’s solution also supports secure tokenization, features universal support of all EVM-compatible layer-1 blockchains, and grants users instant access to all layer-2 smart contracts. Customers have access to the highest insurance coverage in the market ($1B per Vault). -
5
PARSIQ
PARSIQ
Connect blockchain activity to off-chain apps and devices. Monitor and secure DeFi applications. Build custom event triggers and power real-time automations. Create simple triggers that produce notifications for any blockchain transactions, even at scale. Create complex workflows spanning across multiple blockchains and off-chain apps. Add conditional logic, aggregate, format data and much more. Monitor any activity. Easily create automation connections between blockchains and apps with our quick monitoring wizard. For small businesses and personal users PARSIQ keeps Smart-Triggers organized and accessible. Large enterprises are provided with a dedicated infrastruсture and have the ability to fully customize their monitoring applications. PARSIQ provides all necessary delivery transports based on your specific needs, from emails to refrigerator smart-screen notifications.Starting Price: $41 per month -
6
Notebook
Notebook
Zero-knowledge cryptography for anonymous KYC and soul-bound credentials. We believe that the future of trust is blockchain. Notebook helps you secure your identity and your data, so you can authenticate yourself in a trustless world. Notebook leverages fragmented identity and Zero-Knowledge Proofs to keep users anonymous. A Notebook is stored on-chain in a smart contract, meaning no individual or corporation owns your identity or data but you. A Notebook is the best way to store summary statistics, such as metrics for credit score and bad-actor behavior. Storing such metrics makes for a more fair world, where people are held accountable for all their actions and believe in the greater good. The PII data required when a user onboards prevents an individual from creating multiple Notebooks, without compromising on their privacy. Notebook's identification system is dissociated from the user's wallet addresses, allowing the same identity to be used cross-chain. -
7
Huawei Blockchain Service
Huawei Cloud
Blockchain Service (BCS) is a highly available and secure blockchain platform allowing enterprises and developers to conveniently create, deploy, and manage applications with the superb performance and cost-effectiveness of HUAWEI CLOUD. Built using innovative technologies based on Kubernetes, featuring security, simple configuration, deployment in minutes, and automatic multi-angle E2E O&M. Lower development and deployment costs, pay-per-use convenience, reduced O&M expenditures with unified management, and auto scaling and upgrade/rollback on demand. Multiple efficient consensus algorithms (10,000+ TPS) and flexible switching, dynamic join-in or quitting of multi-role nodes and members, and container-based management. Complete management and isolation of users, keys, and permissions; multi-layer encryption and privacy assurance; and fully demonstrated cyber security infrastructure. Uses decentralized, tamper-proof, shared ledgers to ensure transparency and fairness. -
8
HID IdenTrust
HID
Comprehensive lifecycle management of every certificate in your network for on-premise or cloud-based PKI deployments. Easily migrate from existing certificate authority with policy-based automated issuance, renewal and revocation, eliminating manual processes and related errors. Enterprises increasingly rely on public key infrastructure (PKI) to secure machines, devices, and human access using keys and digital certificates. In partnership with Keyfactor, HID IdenTrust offers a way to simplify PKI and automate certificate lifecycle management at scale. HID IdenTrust delivers cloud-based managed PKI to issue public, private or U.S. Government interoperable (FBCA) digital certificates to secure websites, network and IoT devices, and workforce identities. Discover every certificate across network and cloud environments with real-time inventory of public and private CAs, distributed SSL/TLS discovery tools, and direct integration with key and certificate stores. -
9
Valid Network
Valid Network
Blockchain and Cryptocurrencies are NOT safe. Malicious hackers and human errors cost billions of dollars a year in fraudulent transactions and lost value. Existing cybersecurity tools cannot deal with Blockchain technology. Valid Network protects Blockchain and Crypto pioneers, enterprises expanding to Blockchain, and the Blockchain ecosystem by offering a holistic and modular security platform for Blockchain. New security requirements are a direct result of technology revolutions. Without a fitting solution, the revolution can’t be completed. Valid Network enables enterprises to innovate with blockchain, faster and safer than before. Establish a blockchain security perimeter and easily enforce compliance across consortium participants, giving your teams the visibility and control they need. The Valid Network blockchain security platform and security service provides full lifecycle security for enterprise blockchains from initial development to active deployment and management. -
10
Halborn
Halborn
Using deep security inspection and the latest offensive security tactics, we work to find critical vulnerabilities in applications before they are exploited. We use hands-on assessment by our team of dedicated ethical hackers to simulate the latest activities and techniques used by threat actors. We pentest everything from web apps to wallets and layer1 blockchains. Halborn provides an exceedingly thorough analysis of a blockchain application’s smart contracts in order to correct design issues, errors in the code, or identify security vulnerabilities. We perform both manual analysis and automated testing to make sure your smart contract application or DeFi platform is ready for mainnet. Get your security and development processes automated to save you time and money. Our expertise is in automated scanning, CI/CD Pipeline development, Infrastructure as Code, Cloud Deployment, SAST/DAST integration, and experience to help build an effective DevSecOps culture. -
11
SecureKloud
SecureKloud
SecureKloud is a cloud native company with a combination of products, frameworks, and services, designed to solve problems around Blockchain, Cloud, Enterprise security, Decision Engineering, and Managed Services. As a pioneer in enabling cloud transformation for global enterprises, we’re building on our foundation of cloud capabilities by creating innovative platforms that are time-tested and designed to drive success in your digital transformation journey. Aligned to the changing world of our customers, our platform pillars are architected on strategic innovation and powerful technologies that drive digital transformation to businesses of any size—today and as the business needs evolve. Leverage the power of automation and move to the cloud faster. Deploy your enterprise-grade applications at a fraction of the cost. Build and enhance your cloud infrastructure in about a day and at a cost cheaper than “Do It Yourself.” -
12
GlobalSign IoT Identity
GlobalSign
Provision, secure and manage device identities with a PKI-based cloud IoT Identity Platform, purpose built for scalable, flexible and interoperable IoT security. GlobalSign’s next-generation IoT Identity Platform delivers everything you need for full device identity lifecycle management from design and manufacturing, through deployment, management and sunsetting. Provision and secure device identities with a purpose-built, PKI-based platform for exceptional security. Public Key Infrastructure is the de facto credential for IoT and IIoT device identity. Simplify, optimize and harden how you enroll, secure and manage PKI-based, IoTdevice identities with a full-featured IoT registration authority service that ensures secure, customizable device enrollment. It’s the key to provisioning unique, strong and secure device identities. -
13
Azure IoT Hub
Microsoft
Managed service for bidirectional communication between IoT devices and Azure. Enable highly secure and reliable communication between your Internet of Things (IoT) application and the devices it manages. Azure IoT Hub provides a cloud-hosted solution back end to connect virtually any device. Extend your solution from the cloud to the edge with per-device authentication, built-in device management, and scaled provisioning. Use device-to-cloud telemetry data to understand the state of your devices and define message routes to other Azure services—without writing any code. In cloud-to-device messages, reliably send commands and notifications to your connected devices and track message delivery with acknowledgement receipts. Automatically resend device messages as needed to accommodate intermittent connectivity. Azure IoT Central: Proof of concept isn’t your endgame. We’ll help you build industry-leading solutions with a hosted IoT application platform.Starting Price: $10 per IoT unit per month -
14
GlobalSign
GlobalSign
GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers and IoT innovators around the world to conduct secure online communications, manage millions of verified digital identities and automate authentication and encryption. -
15
AppViewX CERT+
AppViewX
The AppViewX CERT+ platform provides users with a full-cycle certificate management suite, enabling 360-degree control and visibility into network infrastructures. It permits the handling of certificate operations such as renewals, revocation, and provisioning from a single interface, and is ingrained with workflow automation, dynamic monitoring, and auditing capabilities. The platform is built for convenience, and drastically reduces the errors, outages, and downtime caused by improper management of PKI. AppViewX software can be deployed in the Linux virtual machines on all AWS elastic compute cloud (EC2), Azure Compute and Google Compute Engine using thesoftware installer. Contact AppViewX team from the Azure and Google Cloud marketplace listings. CERT+ has API integrations with private CA certificate authority services. Certificates can be seamlessly enrolled from these services and used on any devices or applications being managed via CERT+. -
16
SecureW2
SecureW2
Even for organizations under 500 employees, a 2020 IBM report found credential compromise averaged $2.35M in costs. Eliminate the threat by using x.509 certificates for Wi-Fi, VPN, Web Apps, Endpoint Login & more. Leverage your existing Wi-Fi, Web, Firewall and VPN infrastructure with zero technology forklift upgrades. With SecureW2, you can verify that only trusted users and devices can access your network and applications. Enabling 802.1x in the cloud has never been easier. SecureW2 provides everything you need to use your Azure, Okta, or Google to enroll and manage certificates for secure Wi-Fi authentication. Plus it comes with the World’s only Dynamic Cloud RADIUS server, giving you everything you need for secure WPA2-Enterprise network authentication. Onboard every major operating system with ease and deliver secure connections with no IT burden. Secure your network with certificates using the generation, delivery, authentication and renewal technology. -
17
Secardeo TOPKI
Secardeo
Digital certificates offer a high degree of security for encryption, strong authentication and digital signatures. In an enterprise PKI you need appropriate services for certificate management and key management. Secardeo TOPKI (Trusted Open PKI) is a PKI system platform for automated key distribution of X.509 certificates and private keys to all users and devices where they are required. For this, TOPKI provides components that serve for specific certificate lifecycle management tasks. The PKI software components of the TOPKI platform can be integrated with other PKI systems, Active Directory or Mobile Device Management systems. TOPKI enables a seamless adoption of managed PKI services. By this you can automatically request certificates from trusted public CAs in the cloud. Or you can use open source CAs, for example to auto-enroll internal computer certificates. The TOPKI PKI products can also enhance your existing Microsoft PKI. -
18
Comodo Certificate Manager
Comodo
Advanced Certificate Issuance And Lifecycle Management. Discover and manage all your SSL Digital Certificates automatically. Secure, reliable and centralized management platform. Helps you self-administer, instantly provision and control all SSL/PKI. Expired SSL certificates can cause systems to break, services to go down, and trust in your business to wane. Keeping track of digital certificates and their renewal dates is a big job and it's going to get harder. Need for a mechanism to administer certificates effectively. Flexible and reliable system for digital certificate issuance and lifecycle management. Centralizes and automates management of cryptographic keys and digital certificates. Ensures that certificates do not expire unexpectedly. Secure, tiered cloud-based administration. Microsoft Active Directory integration. Certificate Discovery Tool finds all certificates no matter who issued them. Administrative protection using two-factor authentication and IP address validation. -
19
TuringCerts
Turing Chain
Adopted incorruptible, secure, and trustworthy blockchain technology to ensure 100% authenticity for every certificate. HR departments can verify authenticity anytime at anywhere via links shared by students to make personnel screening more convenient and time saving. Let students' learning portfolio be saved properly, and omit the incovenience for doing paper work, additionally, reduce the human cost for preserving data. Import background image and information filed. Send to recepient email automatically. -
20
Beosin EagleEye
Beosin
Beosin EagleEye provides 24/7 blockchain security monitoring and notification services. It sends customers real-time security alerts and warnings when it detects risks like hacker attacks, frauds, flash loans, rug pulls through on-chain and off-chain data analysis, and multi-dimensional security assessments. 1. 24x7 Blockchain Project Security Monitoring 2. Risk Transaction Identification, Such as Large Outflow, Flash Loan, Privileged Operation, Exploiter, etc. 3. Real-time Security Incident Alerts and Warnings 4. Based on On-chain and Off-chain Data Analysis 5. Multi-dimensional Security Assessments 6. Blockchain Sentiment Notification Support User Interface & API MethodStarting Price: $0 -
21
ExchangeDefender
BlockSafe Technologies
Crypto exchanges have hot wallets and cold wallets. The wallets store user secret keys as well as the exchange’s secret keys. Most of the keys are stored offline in vaults (cold wallet). A portion of the keys are stored on servers connected to the internet (hot wallet) to facilitate transactions. These servers are susceptible to a data breach just like any other hacker attack. Exchange Defender comprises two products to protect the internal systems of the crypto exchange. These are – CryptoDefender™ (described earlier) and ProtectID®. ™protects the exchange’s computers and mobile devices from keylogging, screen capture and clickjack attacks. ProtectID® secures access to the internal systems via two factor out-of-band authentication. -
22
Kaspersky Blockchain Security
Kaspersky Blockchain Security
Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Its many applications make blockchain technology a key element in establishing business processes that can even be applied in manufacturing. Blockchain technology is present in IoT networks, workflow management systems, cryptocurrencies and many other fields. It is now an essential component and state-of-the-art standard for a whole host of businesses. However, being a security-driven measure, a blockchain itself can be exposed to various risks. Given the fact that blockchains contain sensitive information about the assets and infrastructure of specific users and enterprises, providing comprehensive protection is critically important. Instant reaction to intrusions, identity compromise and security breaches. Neutralize cyberattacks without waiting for them to violate and crash your network. -
23
CipherTrace
CipherTrace
CipherTrace delivers cryptocurrency AML compliance solutions for some of the largest banks, exchanges, and other financial institutions in the world because of its best-in-class data attribution, analytics, proprietary clustering algorithms, and coverage of 2,000+ cryptocurrency entities, more than any other blockchain analytics company. Protection from money laundering risks, illicit money service businesses and virtual currency payment risks. Know your transaction automates Crypto AML compliance for virtual asset service providers. Powerful blockchain forensic tools enable investigations of criminal activity, fraud, and sanctions evasion. Visually trace the movement of funds. Monitor crypto businesses for AML compliance, evaluates KYC effectiveness and audits performance. CipherTrace’s certified examiner training provides hands-on instruction in blockchain and cryptocurrency tracing. -
24
GlobalSign IoT Edge Enroll
GlobalSign
Proper PKI device enrollment is key to provisioning unique, strong and secure devices identities. IoT Edge Enroll is a full-featured, registration authority service that ensures simple, secure and optimized device enrollment. It’s a key component of our PKI-based IoT Identity Platform that enables Device Identity Lifecycle Management. It’s the most comprehensive, flexible, commercial PKI device enrollment feature set available. Certificate Templating Engine for Exacting Enrollment - Leverage custom certificate fields and data to deliver maximum flexibility for unique IoT authentication requirements. Device Identity Manager for Admin Control - Manage unique device identities throughout their lifecycles including certificate auditing and reporting, device whitelist management, device enablement/disablement and enrollment eligibility. -
25
NuCypher
NuCypher
Manage secrets such as IAM tokens, database and SSH credentials, and signing/encryption keys across dynamic environments. Conditionally grant and revoke access to sensitive data to arbitrary numbers of recipients. Process encrypted data while preserving the confidentiality of the inputs and results. NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols. NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes. Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data. -
26
FYEO
FYEO
FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization. -
27
CYBAVO
CYBAVO
CYBAVO is a digital asset security company founded by experts and pioneers from the cryptocurrency and security industries with more than 20 years experience in cybersecurity at the highest level. CYBAVO’s mission is to provide the most technologically advanced security to digital asset custodians. Through our expertise in cybersecurity and decentralized technology, we empower blockchain companies with enterprise-ready cryptocurrency wallet management services, secured with the best technology available. Our robust cryptographic scheme protects your private keys and minimizes the risk of key loss by implementing a shared responsibility model. Any attacker would need to compromise at least three different entities in order to theoretically gain access to your keys. Security is the core foundation of our solution. Our platform is secure on every front, from the operating system and programming language level, all the way up to strong enforcement of our transaction policy. -
28
CYBEATS
CYBEATS
Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices. Cybeats unique approach eliminates device downtime due to cyber-attacks and allows device manufacturers to develop and maintain secure and protected devices in a timely and cost-efficient manner. Identify security vulnerabilities throughout the development process so security is built into the connected device, not after deployment. Real-time trusted device profiles protect against abnormal device behavior and allow for immediate response and no downtime. Ensure deployed devices continue to be secure and protected, including secure firmware update and managed provisioning. Cybeats sentinel and device profile allows for immediate response to an attack without the need to quarantine and remove the device from the operation. -
29
Hypernative
Hypernative
Hypernative detects the widest range of attacks but only alerts you to those that matter. Stop hacks before they do any damage. Make your security unassailable. Detect the overwhelming majority of attacks with high accuracy, minutes before the first hack transaction. Leverage automated actions and alerts to keep your assets safe from harm. Keep attackers out without degrading the experience for the rest of the users. Prevent specific malicious interactions without pausing the entire protocol by identifying interacting contracts or wallets as malicious or legitimate. Screen addresses and correctly identify risks prior to authorizing transactions. Receive address reputation across multiple chains. Hypernative can protect you from zero-day vulnerabilities, frontend hacks, state actor threats, and much more. Hypernative stops zero day cyber threats, economic and governance risks and protects digital assets managers, protocols and Web3 applications from significant losses. -
30
Redefine
Redefine
Powerful firewall solution integrated into a revolutionary proactive risk mitigation system. Our platform is built from the ground up with the DeFi investor in mind. We are pioneering active risk mitigation technology to provide an unprecedented level of DeFi security. The fully automated system, ready to assess new DeFi opportunities within seconds. DeFi platforms offer lucrative returns, but not all have good intentions. Smart contracts and the composable nature of DeFi make it inherently vulnerable. DeFi investing introduces new types of financial risks like impermanent loss and MEV strategies. Risk analytics engine that automates due-diligence of platforms and contracts and quantifies the risk by using on-chain, off-chain and time-based metrics. Know-your-own-transaction solution simulates the transaction in real-time and reflects the risks to the user before signing. -
31
Fireblocks
Fireblocks
Build, run and scale a profitable digital asset business. Fireblocks is an all-in-one platform to store, transfer, and issue digital assets across your entire ecosystem. With the Fireblocks DeFi API and Browser Extension, you can now securely access the full range of DeFi protocols for strategies like decentralized exchange (DEX) trading, lending/borrowing, staking, and yield farming. Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Move and settle assets 24/7 using the first & only institutional asset transfer network. Maximize your balance sheet, reduce counterparty risk, and unlock new revenue opportunities. Enjoy peace of mind with the only insurance policy that covers assets in storage, transfer and E&O. SOC 2 Type II and regular pen testing from ComSec and NCC Group. -
32
Lockchain
Lockchain
Avert catastrophic events in digital assets with Lockchain’s AI-powered security data pipeline. Lockchain aggregates on-chain data and available open source intelligence to provide you with insights on risks ahead of time. Receive alerts via email, Slack, or Telegram that explain to you exactly what risk events are happening right now that are relevant to your portfolio. Lockchain checks on-chain data to make sure your assets are where the exchange says they are. Monitor every custody platform in one place. Lockchain's AI interprets countless data sources. Get access to Lockchain’s 24/7, real-time due diligence and automation platform, so you can avert the catastrophic events in the world of digital assets. Use Lockchain's database of security and trust data as a part of your due diligence process. Lockchain monitors and alerts you to additional impacts based on current risk events. Tell Lockchain exactly what parts of your portfolio to monitor.Starting Price: Free -
33
Vdoo
Vdoo
The recent proliferation in the number of connected device vulnerabilities and offensive activities has pushed customers and regulatory agencies to rapidly increase their demands for improved device security, while for device manufacturers and vendors it has significantly increased security-related risks to their business, reputation and bottom-line. As a result, device security has become a strategic imperative for manufacturers, vendors, operators and service providers in multiple verticals, which requires them to quickly scale up their ability to provide optimal device security across all business units and product lines. This is where Vdoo comes in with the only automated device security platform that covers the entire device lifecycle – from design, development and testing to deployment and maintenance. To ensure optimal security, all the right building blocks need to be baked into the device while it’s still being developed. -
34
Electric Imp
Electric Imp
The Electric Imp Platform is purpose-built for IoT with a unique edge-to-enterprise architecture; featuring fully integrated hardware, device and cloud software, communications, APIs, managed cloud services, and continuous security for a complete and solution-ready offering. The Electric Imp Platform and imp-authorized hardware module securely connects your new product or existing product retrofit to the Electric Imp Cloud. The Electric Imp Cloud authenticates and manages all devices at scale, establishes secure connectivity, and handles the necessary processing and integrations as the data flows between the Device and Customer Cloud Tiers. Your IoT business application lives in the Customer Cloud where it receives trusted, reliable, processed device data from the Electric Imp Cloud. Ready to discuss how your business can work with Electric Imp?Starting Price: $3 + data usage per month -
35
When it comes to securing your business, it’s better to be safe than sorry. Devices can’t always be trusted, nor can every user that accesses your network. With Managed Certificate Services (MCS), you can immediately authenticate users and protect critical data across your infrastructure, devices, and applications, all through a centralized and trusted digital certificates source. With one of the largest IP networks supporting many Fortune 1000 companies, we understand the importance of building robust security solutions in this era of digital transformation. With MCS as your certificate manager, you can balance highly effective security while maintaining speed to business. MCS is an automated authentication service for your certificate chain, providing full lifecycle management for all digital credentials, corporate, user, application, service, device, machine, throughout the entire enterprise.
-
36
Nexus Smart ID Corporate PKI
Nexus Group
Issue, manage and automate PKI certificates for people, services and devices to enable strong authentication, data confidentiality, integrity and digital signatures, with Smart ID Corporate PKI. A corporate public-key infrastructure can issue and manage trusted identities for people, devices and services, forming the basis of information security in an organization. Smart ID provides a reliable foundation, including roles, policies and procedures, for issuing and managing trusted, certificate-based identities. Smart ID corporate PKI is a flexible and scalable solution that can be used by any organization to issue, manage and validate certificate-based digital identities for mixed endpoint environments that include people, infrastructure and things. Based on standard products that are proven in business-critical environments and made in Sweden. -
37
StrongKey
StrongKey
StrongKey has been in the PKI business for almost 20 years, with implementations across the globe in a diverse range of applications. StrongKey Tellaro provides a full public key infrastructure (PKI) platform for managing keys and digital certificates. With a built-in hardware security module (HSM) and EJBCA server, customers are able to issue digital certificates with our Tellaro E-Series based on securely generated public keys. Private keys are generated and stored within the HSM. Our PKI management solution integrates with TLS/SSL, identity access management (IAM), digital signature, secrets management, and device management systems. StrongKey Tellaro is a comprehensive software suite that provides strong authentication, encryption, tokenization, PKI management, and digital signature management. Our open-source software includes a FIDO® Certified FIDO2 server, and we support flexible data center and cloud deployment models. -
38
Venafi
Venafi
Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs). -
39
Sectigo
Sectigo
Global leader in cybersecurity solutions to secure websites, connected devices, applications, and digital identities. Sectigo is a leading provider of digital identity solutions, including SSL / TLS certificates, DevOps, IoT, and enterprise-grade PKI (Public Key Infrastructure) management, as well as multi-layered web security. As the world's largest commercial Certificate Authority with more than 700,000 customers and over 20 years of experience in online trust, Sectigo partners with organizations of all sizes to deliver automated public and private PKI solutions for securing web servers, user access, connected devices, and applications. Recognized for its award-winning innovation and best-in-class global customer support, Sectigo has the proven performance needed to secure the digital landscape of today and tomorrow. Sectigo is the market leader in SSL / TLS certificates, DevOps, IoT, enterprise-grade PKI (Public Key Infrastructure) management, and multi-layered web security.Starting Price: $125 -
40
AVX ONE
AppViewX
AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments. -
41
Armis
Armis Security
Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California. -
42
BlockchainDefender
BlockSafe Technologies
Blockchain Defender acts as a gateway between the application and a private blockchain. It examines every message, checks if it is allowed as per enterprise rules & policy, scans the contents of data fields for malware and authenticates transactions via the ProtectID® system. Content Scanner to stop malware before it enters the blockchain. BlockSafe Technologies™ is a subsidiary company of StrikeForce Technologies, Inc. (OTCQB: SFOR), a leading provider of cybersecurity solutions for consumers, corporations, and government agencies. BlockSafe Technologies™ has been granted licensing rights to implement and distribute the patented, award-winning cybersecurity technology offered by StrikeForce Technologies, Inc. -
43
BlocMonitor
BlocWatch
BlocMonitor displays and logs every event on your network, while providing full visibility of all chain activity and alerts of critical events in real-time. These features allow for immediate action and intervention, minimizing any downtime that may occur. BlocMonitor also gives you an overview of multiple chains or networks at once, using intuitive dashboards, while providing the ability to dive deeper into the details of individual components. BlocMonitor offers options to customize the reports, making it easy to display the data most vital to your operations. Dashboards are available as soon as our agent is integrated and provide detailed and intuitive menus, tabs, and layout styles. BlocMonitor’s alerts notify you of any indication of a critical event or security vulnerability. They come pre-built and notify you of important events through emails, downloadable reports, and API calls.Starting Price: $2,500 per month -
44
Cynerio
Cynerio
We cover every threat vector with automated security and risk reduction for every Healthcare IoT device--from medical/IoMT devices to Enterprise IoT and OT systems to ensure patient safety, data confidentiality, and operational continuity. The Cynerio platform promotes proactive and preemptive cybersecurity with automated risk reduction, threat mitigation, attack prevention tools, and step-by-step remediation programs built on a zero trust framework infused with clinical context to get hospitals secure--fast. Healthcare IoT devices make hospital networks extremely vulnerable. Insecure devices increase the cyber attack surface and pose a major risk to patient safety and the operational continuity of hospitals. MarinHealth wanted to effectively segment medical and other IoT devices on their network without disrupting care. Enter Cynerio, who helped them realize they could protect devices from active malware too. -
45
Bitfury
Bitfury
Exonum Enterprise is Bitfury’s premier blockchain-as-a-service solution, designed to help governments and companies integrate blockchain into their operations. Crystal is a web-based software tool that helps financial institutions and law enforcement manage blockchain investigations. An Exonum blockchain can reduce inefficiencies and build security and trust in all sectors including government, healthcare, education, real estate, insurance and retail. Secure storage, easy retrieval and protected access to government documents hinders efficient operations and increases costs for many governments. A blockchain-based system can serve as a verification clearinghouse for these documents by providing public and private proof of the veracity of a document or certification. -
46
AIKON
AIKON
Secure user Identities on the Blockchain. GDPR & CCPA compliant Identity as a Service that connects businesses & their users to the most important public blockchains - Algorand, EOS, Ethereum and more! Manage any blockchain with one service. AIKON helps connect your business to multiple blockchains in a cost effective manner, and works with your existing technology stack. Seamlessly move your customers onto the blockchain. Login with email, phone or Social login. Companies can sign on user's behalf. Out of the box, API-based solution. Works across chains. Use existing engineers instead of hiring or training new skill sets. All the features to make sure you are GDPR & CCPA compliant for your users. Blockchain based infrastructure to keep access and data secure and separate. Native blockchain accounts made easy. Let your users sign up the way they know how - using familiar social, email or SMS logins. -
47
Phosphorus
Phosphorus Cybersecurity
Phosphorus is the backbone tool to secure the rapidly growing and often unmonitored enterprise IoT landscape. Providing visibility down to the device model and firmware version, Phosphorus gives you full, granular visibility into all embedded devices on your network. Phosphorus’s patented capabilities allow you to update all of your IoT devices to the latest firmware and rotate credentials at the click of a button. Unlike traditional scanners that search for vulnerabilities or require expensive Spanports, Phosphorus’s scanner provides light-touch detection of all IP-enabled IoT devices on your network without “knocking them over”. Gain full enterprise protection with our solutions. Audit IoT inventories. Meet compliance requirements and industry regulations. Automate key tasks like policy enforcement and patching updates – all at a fraction of the cost. -
48
BlockCypher
BlockCypher
Our architecture allows us to run in multiple data centers for redundancy and low-latency. Simple and easy web APIs (REST) enable developers to build blockchain applications quickly and confidently. Our modular, cloud-optimized architecture is enterprise-grade for scalability, performance and reliability. We maintain a cluster of distributed databases which contain all transactional data for the entire blockchain. We host full-node blockchains for optimal security in validating and relaying transactions.Our focus is to make our customers successful as they build their next-generation blockchain applications. BlockCypher quickly identifies fraud and transactions likely to confirm. -
49
CertiK Skynet
CertiK
CertiK Skynet is the intelligence engine powering the security scores seen on Security Leaderboard. It provides 24/7 security analysis for your smart contracts. By leveraging a combination of static and dynamic technologies, Skynet provides an intelligence engine that works around the clock to verify the security of your project and smart contract. Through the publication of an easily accessible, human-readable, security score, users are able to assess the security of a project at a glance. -
50
Consensys Diligence
Consensys
Security is critical in the blockchain space. Our comprehensive smart contract audit service helps everyone from startups to enterprises launch and maintain their Ethereum blockchain applications. Our industry-leading suite of blockchain security analysis tools, combined with hands-on review from our veteran smart contract auditors, ensures that your Ethereum application is ready for launch and built to protect users. Auditing your code early in the development lifecycle prevents potentially catastrophic vulnerabilities after launch. Our APIs provide affordable smart contract security options and the peace of mind that your code is fortified. Veteran security auditors manually double-check your code to eliminate spurious results. Our tools integrate into your development environment so you can perform continuous security analysis. Receive a vulnerability report with an executive summary, vulnerability details, and mitigation guidance.