Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Keywhiz serves as a robust solution for the management and distribution of sensitive information, making it particularly compatible with service-oriented architectures (SOA). This presentation provides a concise overview of its functionalities. Traditional methods often involve placing secrets within configuration files adjacent to the source code, or transferring files to servers through out-of-band methods; both approaches pose significant risks of exposure and complicate tracking efforts. In contrast, Keywhiz enhances the security and ease of secret management by allowing secrets to be centrally stored in a clustered environment, with all data encrypted in a database. Clients securely access their authorized secrets using mutually authenticated TLS (mTLS), ensuring a high level of security during transmission. Administrators can manage Keywhiz through a command-line interface (CLI), facilitating user-friendly operations. To support various workflows, Keywhiz offers automation APIs that utilize mTLS for secure communication. Every organization invariably has services or systems that necessitate the safeguarding of secrets, including items such as TLS certificates, GPG keys, API tokens, and database credentials. While Keywhiz is dependable and actively used in production environments, it is worth noting that occasional updates may disrupt backward compatibility of the API. As such, organizations should remain vigilant about testing changes before deployment.

Description

Ship the integrations that your customers and prospects require now, and watch your revenue soar without compromising your core products. Deliver secure, deep, and powerful integrations with advanced observability features and security for all types of use cases. We never store any of your customer's data. You can also securely store their OAUTH2 access tokens in your AWS Secrets Manager accounts. OAUTH2 authentication keeps your customers' credentials safe while giving them the ability to revoke their access tokens at any time. Use your OAUTH2 client secrets and IDS to take control of branding and security. Your application will have full autonomy over authorization and access tokens. Avoid the headaches of juggling multiple APIs and complex data transforms. Simplify integration with a single API and data model.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Ashby
BambooHR
Bitbucket
Bullhorn
Dayforce
Dropcontact
Facebook
FullContact
GoHighLevel
Google Drive
HubSpot CRM
Jobvite
LeadSift
React
SAP SuccessFactors
Slintel
Tally Shoper 9
Tribepad
X (Twitter)
Zoho CRM

Integrations

Ashby
BambooHR
Bitbucket
Bullhorn
Dayforce
Dropcontact
Facebook
FullContact
GoHighLevel
Google Drive
HubSpot CRM
Jobvite
LeadSift
React
SAP SuccessFactors
Slintel
Tally Shoper 9
Tribepad
X (Twitter)
Zoho CRM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$250 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Keywhiz

Founded

2015

Website

square.github.io/keywhiz/

Vendor Details

Company Name

Unified.to

Founded

2023

Country

Canada

Website

unified.to/

Product Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Product Features

Integration

Dashboard
ETL - Extract / Transform / Load
Metadata Management
Multiple Data Sources
Web Services

Alternatives

Alternatives

Knox Reviews

Knox

Pinterest
Mallary.ai Reviews

Mallary.ai

Mallary Labs LLC
API2Cart Reviews

API2Cart

MagneticOne