Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Bastillion serves as a web-based SSH console that consolidates the management of administrative access to various systems. This innovative platform combines web administration with the oversight and distribution of users' public SSH keys, utilizing profiles assigned to specific users for organization. Administrators are able to log in securely using two-factor authentication methods such as Authy or Google Authenticator. Once logged in, they can efficiently manage their public SSH keys or establish connections to their systems via a web shell interface. Furthermore, the system allows for the sharing of commands across different shells, which simplifies the patching process and reduces the need for executing redundant commands. Bastillion enhances security by layering TLS/SSL over SSH and functioning as a bastion host for administration purposes. The stacking of protocols (TLS/SSL + SSH) ensures that the infrastructure remains secure and is not vulnerable to exposure through tunneling or port forwarding. In addition, SSH key management is automatically activated to prevent the presence of unmanaged public keys and to uphold best security practices. Bastillion can be used freely under the Prosperity Public License, making it an accessible tool for organizations seeking to streamline their administrative processes. This combination of features positions Bastillion as a robust solution for secure system management in today’s digital landscape.

Description

For nearly two decades, StrongKey has been a key player in the PKI sector, with installations around the world in a variety of fields. The StrongKey Tellaro platform delivers a complete public key infrastructure (PKI) solution for overseeing keys and digital certificates. Equipped with an integrated hardware security module (HSM) and EJBCA server, clients can issue digital certificates using our Tellaro E-Series, which is based on securely produced public keys. The generation and storage of private keys occur within the HSM for enhanced security. Our PKI management system seamlessly integrates with TLS/SSL protocols, identity access management (IAM), digital signatures, secrets management, and device management frameworks. In addition to being a robust software suite that facilitates strong authentication, encryption, tokenization, PKI management, and digital signature oversight, StrongKey Tellaro also features open-source components, including a FIDO® Certified FIDO2 server. Furthermore, we offer adaptable deployment options that cater to both data center and cloud environments, ensuring that our customers have the flexibility they need.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Marketplace
Amazon Web Services (AWS)
Authy
Google Authenticator

Integrations

AWS Marketplace
Amazon Web Services (AWS)
Authy
Google Authenticator

Pricing Details

$0.015 per hour
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Bastillion

Country

United States

Website

github.com/bastillion-io/Bastillion

Vendor Details

Company Name

StrongKey

Founded

2001

Country

United States

Website

www.strongkey.com/pki-key-and-certificate-management

Product Features

Product Features

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Alternatives

Xshell Reviews

Xshell

NetSarang
Cerberus FTP Server Reviews

Cerberus FTP Server

Redwood Software
emCA Reviews

emCA

eMudhra
Secardeo TOPKI Reviews

Secardeo TOPKI

Secardeo