24 Integrations with Keyfactor Command for IoT

View a list of Keyfactor Command for IoT integrations and software that integrates with Keyfactor Command for IoT below. Compare the best Keyfactor Command for IoT integrations as well as features, ratings, user reviews, and pricing of software that integrates with Keyfactor Command for IoT. Here are the current Keyfactor Command for IoT integrations in 2025:

  • 1
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
    Starting Price: $7 per month
  • 2
    Kubernetes

    Kubernetes

    Kubernetes

    Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.
    Starting Price: Free
  • 3
    GoDaddy Website Security
    Protect your site and get peace of mind. Free SSL Certificate now included with Ultimate plans. Monitors, alerts and cleans your site, plus advanced security protection and speed boost. Expedited website repair. — the fastest response time of all. Monitors, alerts and cleans your site, plus advanced security protection and speed boost. Protection for unlimited pages within a single website. Security analysts for advanced issues. Advanced security monitoring. Google blacklist monitoring and removal. Brand reputation monitoring. Unlimited malware removal and hack repair. Trusted site seal. 100% clean site - guaranteed. 30-day money back guarantee. Compatible with most CMS and custom-coded sites. Advanced protection and speed boost. (Deluxe, Ultimate and Express) CDN performance accelerator and Advanced DDoS mitigation. (Deluxe, Ultimate, and Express).
    Starting Price: $5.59 per month
  • 4
    Jenkins

    Jenkins

    Jenkins

    The leading open source automation server, Jenkins provides hundreds of plugins to support building, deploying and automating any project. As an extensible automation server, Jenkins can be used as a simple CI server or turned into the continuous delivery hub for any project. Jenkins is a self-contained Java-based program, ready to run out-of-the-box, with packages for Windows, Linux, macOS and other Unix-like operating systems. Jenkins can be easily set up and configured via its web interface, which includes on-the-fly error checks and built-in help. With hundreds of plugins in the Update Center, Jenkins integrates with practically every tool in the continuous integration and continuous delivery toolchain. Jenkins can be extended via its plugin architecture, providing nearly infinite possibilities for what Jenkins can do. Jenkins can easily distribute work across multiple machines, helping drive builds, tests and deployments across multiple platforms faster.
  • 5
    Jamf Pro
    Formerly known as Casper Suite, Jamf Pro is an enterprise mobility management (EMM) tool for Apple macOS and iOS devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily: - Choose a zero-touch, hands-free experience or go hands-on through imaging. Either way, enroll devices and deploy them with ease. - Go beyond configuration profiles and use policies and scripts to customize devices for the optimal user experience. - Purchase apps in bulk and make them available automatically or through a Self Service catalog. - Manage device settings and configurations, restrict malicious software, and patch all of your Apple devices without user interaction. Jamf Pro works seamlessly with your existing IT services and technologies, including: Apple Business Manager, Active Directory, SSO/SAML, SCCM, APIs, Cisco ISE, Security Connector and Fast Lane, Conditional Access for Mac.
  • 6
    Symantec Endpoint Protection
    Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.
  • 7
    Azure IoT Hub

    Azure IoT Hub

    Microsoft

    Managed service for bidirectional communication between IoT devices and Azure. Enable highly secure and reliable communication between your Internet of Things (IoT) application and the devices it manages. Azure IoT Hub provides a cloud-hosted solution back end to connect virtually any device. Extend your solution from the cloud to the edge with per-device authentication, built-in device management, and scaled provisioning. Use device-to-cloud telemetry data to understand the state of your devices and define message routes to other Azure services—without writing any code. In cloud-to-device messages, reliably send commands and notifications to your connected devices and track message delivery with acknowledgement receipts. Automatically resend device messages as needed to accommodate intermittent connectivity. Azure IoT Central: Proof of concept isn’t your endgame. We’ll help you build industry-leading solutions with a hosted IoT application platform.
    Starting Price: $10 per IoT unit per month
  • 8
    ServiceNow

    ServiceNow

    ServiceNow

    Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the  IT,  Employee, and  Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.
    Starting Price: $100 per month
  • 9
    Istio

    Istio

    Istio

    Connect, secure, control, and observe services. Istio’s traffic routing rules let you easily control the flow of traffic and API calls between services. Istio simplifies configuration of service-level properties like circuit breakers, timeouts, and retries, and makes it easy to set up important tasks like A/B testing, canary rollouts, and staged rollouts with percentage-based traffic splits. It also provides out-of-box failure recovery features that help make your application more robust against failures of dependent services or the network. Istio Security provides a comprehensive security solution to solve these issues. This page gives an overview on how you can use Istio security features to secure your services, wherever you run them. In particular, Istio security mitigates both insider and external threats against your data, endpoints, communication, and platform. Istio generates detailed telemetry for all service communications within a mesh.
  • 10
    F5 BIG-IP
    Advanced technology for an app-centric world. Apps are your business. BIG-IP application services provide the availability, performance, and security you need to meet business demands. Keep your apps up and running with BIG-IP application delivery controllers. BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS handle your application traffic and secure your infrastructure. You’ll get built-in security, traffic management, and performance application services, whether your applications live in a private data center or in the cloud. BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) manage network resources to keep your applications performing at carrier-grade levels. They also help you identify ways to optimize and monetize your network, improving your bottom line.
  • 11
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 12
    Certificate Authority Service
    Certificate Authority Service is a highly available, scalable Google Cloud service that enables you to simplify, automate, and customize the deployment, management, and security of private certificate authorities (CA). Simplify the deployment, management, and security of your enterprise PKI with a cloud service that helps to automate time-consuming, risky, and error-prone infrastructure tasks, freeing you to focus on higher-value projects. Customize Certificate Authority Service to your needs by configuring custom CAs and certificates, enforcing granular access controls, automating common tasks with APIs, and integrating with your existing systems. Have peace of mind knowing that your CA service is highly available, scalable, backed by an SLA, auditable, and ready to help you achieve compliance with advanced hardware and software security controls. Create a private CA in minutes versus the days and weeks that it takes to deploy and operate your own CA.
    Starting Price: $20 per CA per month
  • 13
    Keyfactor EJBCA
    EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution.
  • 14
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 15
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 16
    Sectigo

    Sectigo

    Sectigo

    Global leader in cybersecurity solutions to secure websites, connected devices, applications, and digital identities. Sectigo is a leading provider of digital identity solutions, including SSL / TLS certificates, DevOps, IoT, and enterprise-grade PKI (Public Key Infrastructure) management, as well as multi-layered web security. As the world's largest commercial Certificate Authority with more than 700,000 customers and over 20 years of experience in online trust, Sectigo partners with organizations of all sizes to deliver automated public and private PKI solutions for securing web servers, user access, connected devices, and applications. Recognized for its award-winning innovation and best-in-class global customer support, Sectigo has the proven performance needed to secure the digital landscape of today and tomorrow. Sectigo is the market leader in SSL / TLS certificates, DevOps, IoT, enterprise-grade PKI (Public Key Infrastructure) management, and multi-layered web security.
    Starting Price: $125
  • 17
    Datacard ID Works
    Support solutions for ID Works Photo Identification Card Software Produce high-quality cards simply and securely with ID Works® identification software. You'll enjoy the features, functionality and scalability needed to seamlessly create card and report designs, production forms and databases. If you are using ID Works v6.0 software and plan to continue to use Microsoft Windows 2000 or XP operating system, you do not need to upgrade to v6.5 as no new features have been added. If you do not have a card printer driver that is Vista operating system compatible, or if you are using the TruFinger Print solution, do NOT upgrade. If you are using TruPhoto solution, you must have v6.5 or greater and if you are using TruSignature solution, you must have v6.5. All components must be Vista operating system compatible for the solution to run on Vista.
  • 18
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 19
    ThingWorx
    The industrial Internet of Things (IIoT) connects your people, products, and processes to power digital transformation. Using industrial IoT platforms, companies connect, monitor, analyze, and act on data in new ways. You can start fast with digital transformation, using IoT for strategic pilots, while easily scaling solutions to reshape your organization. Leaders depend on the industrial IoT from how they design, manufacture, and service products, to how they create value and engage with customers. The best way to accelerate digital transformation is by using a proven industrial IoT platform that’s purpose-built for you. Scale to new markets, improve throughput, and unlock new business models such as products as a service. Get to market faster with rapid application development. Use industrial Internet of Things platforms to wrap and extend legacy assets for new functionality.
  • 20
    AWS Certificate Manager
    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources. SSL/TLS certificates are used to secure network communications and establish the identity of websites over the Internet as well as resources on private networks. AWS Certificate Manager removes the time-consuming manual process of purchasing, uploading, and renewing SSL/TLS certificates. SSL, and its successor TLS, are industry standard protocols for encrypting network communications and establishing the identity of websites over the Internet. SSL/TLS provides encryption for sensitive data in transit and authentication using SSL/TLS certificates to establish the identity of your site and secure connections between browsers and applications and your site.
  • 21
    wolfSSL

    wolfSSL

    wolfSSL

    wolfSSL is an open source internet security company who's primary product is the wolfSSL embedded SSL Library. Its primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, so it is available under commercial license terms for our commercial users and open source for the open source community. Support and consulting are also available from wolfSSL. wolfSSL is the most popular SSL/TLS security option for the IoT. We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. Over 2 Billion applications and devices are secured with wolfSSL products.
  • 22
    Tetrate

    Tetrate

    Tetrate

    Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network.
  • 23
    DigiCert Secure Site
    Simplify the complexities of web security. Without sacrificing security. Count on the world’s most recognized web security company for expertise in every risk management discipline. Encryption is only the beginning. Diversify and deepen your protection against all threats to your website. Get a single view of your entire security picture to maintain app integrity, discover weaknesses and remediate faster. Scale your web security ahead of threats and business growth. Detect, act and protect with ease and speed. Strengthen your overall security posture to minimize damage from the escalation of sophisticated threats. With Complete Website Security, you can free up resources for strategic initiatives, simplify website security complexities, and manage your business with confidence.
  • 24
    IdenTrust Trust Sign
    IdenTrust digital document signing certificates allow individuals and organizations to replace wet ink signatures and create non-repudiable, legally binding signatures in digital documents. In today’s remote work environment, the use of digital signing businesses can streamline various processes, such as sign off of employee timesheets, approval of financial documents and execution of legal or sales contracts. Digital signatures can be executed remotely using any computer, laptop or other portable device on which the document signing certificate is stored.
    Starting Price: $54 per year
  • Previous
  • You're on page 1
  • Next