Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Cylera offers a cybersecurity and analytics solution that is specifically engineered for rapid deployment and smooth integration within your network, ultimately conserving your resources and alleviating stress. Its passive integration feature minimizes the potential for disruptions while ensuring complete visibility across both on-premises and cloud networks for comprehensive deployment. With pre-built APIs, the solution allows for swift setup through out-of-the-box integrations. Its adaptable architecture supports collaboration among various teams and locations. More than just a standard cybersecurity solution, Cylera is tailored for intricate and high-stakes environments, marrying extensive contextual awareness with a profound understanding of operational processes. Powered by our AI-driven cybersecurity and intelligence platform, we deliver real-time insights to address challenges in information technology and cybersecurity. With Cylera, you can effortlessly monitor your existing networks, as it seamlessly connects with many of the platforms you rely on daily, enhancing your overall operational efficiency. Leverage Cylera to not only bolster security but also to streamline your entire network management process.

Description

Keyfactor Command for IoT is an end-to-end identity management solution that ensures the security and compliance of connected devices. By automating the process of provisioning, managing, and revoking device certificates, the platform helps businesses secure IoT devices throughout their entire lifecycle. With support for over-the-air provisioning and real-time visibility into device identity statuses, businesses can easily track and monitor their IoT deployments. Whether for automotive, medical devices, or industrial IoT, Keyfactor Command for IoT provides the tools needed to maintain a trusted, scalable IoT infrastructure. It integrates seamlessly with major IoT platforms, enhancing security with features like automated certificate renewal, revocation, and crypto-agility. This ensures that IoT systems remain secure, adaptable, and compliant with industry standards.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ServiceNow
AIMS
Accruent EMS
Axonius
Azure Key Vault
Certificate Authority Service
Cortex XSOAR
Datacard ID Works
DigiCert Secure Site
Exabeam
ExtremeCloud IQ
F5 BIG-IP
Gigamon
HPE Consumption Analytics
HPE GreenLake
Intelligent Management Center
Juniper Booking Engine
Microsoft Intune
Palo Alto Networks VM-Series
Prisma Access

Integrations

ServiceNow
AIMS
Accruent EMS
Axonius
Azure Key Vault
Certificate Authority Service
Cortex XSOAR
Datacard ID Works
DigiCert Secure Site
Exabeam
ExtremeCloud IQ
F5 BIG-IP
Gigamon
HPE Consumption Analytics
HPE GreenLake
Intelligent Management Center
Juniper Booking Engine
Microsoft Intune
Palo Alto Networks VM-Series
Prisma Access

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cylera

Founded

2017

Country

United States

Website

www.cylera.com/platform

Vendor Details

Company Name

Keyfactor

Founded

2001

Country

United States

Website

www.keyfactor.com/products/command-iot/

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Alternatives

Alternatives

CertSecure Manager Reviews

CertSecure Manager

Encryption Consulting LLC
Alliance Key Manager Reviews

Alliance Key Manager

Townsend Security