Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Accops HyID represents an advanced identity and access management system designed to protect vital business applications and data from potential threats posed by both internal and external users by effectively managing user identities and scrutinizing access. It empowers organizations with robust control over their endpoints, facilitating contextual access, device entry restrictions, and a versatile policy framework. The integrated multi-factor authentication (MFA) works seamlessly with both contemporary and legacy applications, accommodating cloud-based and on-premises solutions. This authentication process is highly secure, utilizing one-time passwords (OTPs) sent via SMS, email, or applications, as well as biometric data and hardware identification through PKI. Additionally, the single sign-on (SSO) feature enhances security while simplifying user experience. Furthermore, businesses can keep track of the security status of their endpoints, including those of bring-your-own-device (BYOD) initiatives, allowing them to make informed decisions regarding access based on real-time risk evaluations. This comprehensive approach ensures that organizations remain agile yet secure in the face of evolving threats.

Description

Keyfactor Command for IoT is an end-to-end identity management solution that ensures the security and compliance of connected devices. By automating the process of provisioning, managing, and revoking device certificates, the platform helps businesses secure IoT devices throughout their entire lifecycle. With support for over-the-air provisioning and real-time visibility into device identity statuses, businesses can easily track and monitor their IoT deployments. Whether for automotive, medical devices, or industrial IoT, Keyfactor Command for IoT provides the tools needed to maintain a trusted, scalable IoT infrastructure. It integrates seamlessly with major IoT platforms, enhancing security with features like automated certificate renewal, revocation, and crypto-agility. This ensures that IoT systems remain secure, adaptable, and compliant with industry standards.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Certificate Manager
Azure IoT Hub
Azure Key Vault
Certificate Authority Service
Datacard ID Works
DigiCert Secure Site
F5 BIG-IP
GoDaddy Website Security
HashiCorp Vault
IdenTrust Trust Sign
Istio
Jamf Pro
Jenkins
Keyfactor EJBCA
Sectigo
ServiceNow
Symantec Endpoint Protection
Tetrate
ThingWorx
wolfSSL

Integrations

AWS Certificate Manager
Azure IoT Hub
Azure Key Vault
Certificate Authority Service
Datacard ID Works
DigiCert Secure Site
F5 BIG-IP
GoDaddy Website Security
HashiCorp Vault
IdenTrust Trust Sign
Istio
Jamf Pro
Jenkins
Keyfactor EJBCA
Sectigo
ServiceNow
Symantec Endpoint Protection
Tetrate
ThingWorx
wolfSSL

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Accops Systems

Founded

2012

Country

India

Website

www.accops.com/products/hyid

Vendor Details

Company Name

Keyfactor

Founded

2001

Country

United States

Website

www.keyfactor.com/products/command-iot/

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Alternatives

Cisco Duo Reviews

Cisco Duo

Cisco

Alternatives

CertSecure Manager Reviews

CertSecure Manager

Encryption Consulting LLC
Alliance Key Manager Reviews

Alliance Key Manager

Townsend Security
PortalGuard Reviews

PortalGuard

BIO-key International