Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 1 Rating

Total
ease
features
design
support

Description

Utilize a cloud IoT Identity Platform centered on PKI to provision, secure, and oversee device identities, designed specifically for scalable, flexible, and interoperable security in the IoT landscape. GlobalSign's advanced IoT Identity Platform provides comprehensive solutions for managing the entire device identity lifecycle, covering everything from design and manufacturing to deployment, ongoing management, and eventual decommissioning. With a focus on exceptional security, this tailored PKI-based platform enables the secure provisioning of device identities. Public Key Infrastructure stands as the standard credential for identifying both IoT and IIoT devices. Streamline, enhance, and fortify the process of enrolling, securing, and managing these PKI-based identities through a robust IoT registration authority service that guarantees secure and customizable device enrollment. By leveraging this platform, organizations can effectively create unique, strong, and secure identities for their devices, ultimately ensuring greater trust and efficiency in IoT deployments. This comprehensive approach to identity management is essential for meeting the evolving security demands of interconnected systems.

Description

Organizations need to be able manage and secure mobile employees and their company information without having to bind to Active Directory. Jamf Connect allows users to unbox their Macs, turn them on, and then access all their corporate applications by signing in with one set of cloud-identity credentials. Learn how cloud identity is changing Mac security, and the crucial role Jamf Connect plays in facilitating the process. This overview will show you how Jamf Connect allows users to be provisioned from a cloud identity service in an Apple provisioning workflow. It also includes multi-factor authentication. An identity management solution can save you time, money, and resources. Businesses must consider a new approach to identity management as part of their enterprise strategy, in order to keep up with changing security and deployment requirements.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Akitra Andromeda
Alertive
AuthPoint
Blocksi
CnSight
Entitle
Harmony Mobile
Hyperproof
Jamf Pro
Jamf Protect
JupiterOne
Mindflow
Monad
Panaseer
ScalePad ControlMap
Serval
Teqtivity
Trustero
UltraDDR

Integrations

Active Directory
Akitra Andromeda
Alertive
AuthPoint
Blocksi
CnSight
Entitle
Harmony Mobile
Hyperproof
Jamf Pro
Jamf Protect
JupiterOne
Mindflow
Monad
Panaseer
ScalePad ControlMap
Serval
Teqtivity
Trustero
UltraDDR

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$2 per user per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

GlobalSign

Founded

1996

Country

United States

Website

www.globalsign.com/en/internet-of-things

Vendor Details

Company Name

Jamf

Founded

2002

Country

United States

Website

www.jamf.com/products/jamf-connect/

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Alternatives

Alternatives

KeyScaler Reviews

KeyScaler

Device Authority