What Integrates with EJBCA?

Find out what EJBCA integrations exist in 2024. Learn what software and services currently integrate with EJBCA, and sort them by reviews, cost, features, and more. Below is a list of products that EJBCA currently integrates with:

  • 1
    Kubernetes Reviews
    Kubernetes (K8s), an open-source software that automates deployment, scaling and management of containerized apps, is available as an open-source project. It organizes containers that make up an app into logical units, which makes it easy to manage and discover. Kubernetes is based on 15 years of Google's experience in running production workloads. It also incorporates best-of-breed practices and ideas from the community. Kubernetes is built on the same principles that allow Google to run billions upon billions of containers per week. It can scale without increasing your operations team. Kubernetes flexibility allows you to deliver applications consistently and efficiently, no matter how complex they are, whether you're testing locally or working in a global enterprise. Kubernetes is an open-source project that allows you to use hybrid, on-premises, and public cloud infrastructures. This allows you to move workloads where they are most important.
  • 2
    Ivanti Neurons for MDM Reviews
    Manage and secure all endpoints to protect data wherever you work. How do you manage the increasing demand for devices and platforms? Ivanti Neurons MDM is a single solution for managing iOS, iPadOS Android, macOS ChromeOS and Windows. Onboard devices quickly and easily and provision them with all the apps and settings they need. Deliver a native, delightful user experience on any device or OS while improving productivity. Manage and protect any iOS device, iPadOS device, Android device, macOS or ChromeOS devices, Windows, VR/XR devices, and ChromeOS devices, all from a cloud-based solution. Know that the devices your supply-chain workers rely on for their daily work are up to date and in good working condition.
  • 3
    Chrome OS Reviews
    Top Pick
    Chromebooks have an all-in-one button. It's the one button that allows you to quickly find what you need. Files. Apps. Online answers. You can find everything you need online by pressing the button. You can work and play for up to 12 hours on one charge. Chromebook doesn't require you to remember your charger. Battery life can vary depending on the device and other conditions. No Wi-Fi, no problem. Access to recent documents, spreadsheets and presentations, as well as emails, is possible with offline access. You can pre-download content and allow offline access to documents, presentations, and emails that you wish to view offline. Swipe, tap, and scroll as you like. There are many touchscreen-enabled* chromebooks. Chromebook provides instant tethering to keep you connected to your phone’s Wi-Fi hotspot.
  • 4
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust.
  • 5
    Graylog Reviews
    You get the answers you need, when you need them, with seamless log data collection. Graylog uses open standards for connectivity to seamlessly collect, store, analyze, and transfer log data. Graylog is also SIEM-agnostic in design. Our log streams can be passed unaltered and enriched data to any application within your monitoring, alerting and analysis stack. You should be able to do more with your security data and performance data by choosing a scalable log management system.
  • 6
    JBoss EAP Reviews

    JBoss EAP

    Red Hat

    $8000
    Red Hat®, JBoss®, Enterprise Application Platform (JBoss EAP), delivers enterprise-grade security and performance in any environment. JBoss EAP is able to help you deliver apps faster everywhere, whether on-premise, virtual, or in private, publicly or hybrid clouds.
  • 7
    Ciphermail Appliance Reviews

    Ciphermail Appliance

    in-put

    $670 one-time payment
    Email encryption with CipherMail The majority of emails are sent in plain text. This means that anyone with access to the data stream could read the contents of the emails. This is unacceptable for most businesses, institutions, and organizations and could also be a violation of applicable law. E-mail encryption is a way to ensure security and trust in communications. CipherMail, a central mail transfer agent, works on the "store-forward" principle. No matter if they come from internal or external sources e-mails are not saved until they are encrypted / decrypted so that they can be forwarded to their intended recipient. This can be done without having to change the email client. It is also possible with any SMTP server. E-mail encryption can either be done in S/MIME, PGP, or in a PDF file. This can also be triggered by a trigger in your subject line. CipherMail also contains a Data Leak Prevention module (DLP).
  • 8
    VMware ESXi Reviews
    A robust, bare-metal virtual hypervisor that can be installed directly on your server. VMware ESXi partitions hardware to consolidate apps and reduce costs. It is the industry standard for efficient architecture and has set the benchmark for reliability, performance, support, and support. IT teams are constantly under pressure to keep up with changing market trends and customer demands. They also have to stretch IT resources to support increasingly complex projects. ESXi balances the need for better business outcomes with IT savings. VMware ESXi enables you to: - Consolidate hardware to increase capacity utilization - Gain a competitive edge by increasing performance - Centralized management streamlines IT administration Reduce CapEx and OpEx - Reduce hardware resources required to run the hypervisor. This will result in greater efficiency.
  • 9
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 10
    MariaDB Reviews
    MariaDB Platform is an enterprise-level open-source database solution. It supports transactional, analytical, and hybrid workloads, as well as relational and JSON data models. It can scale from standalone databases to data warehouses to fully distributed SQL, which can execute millions of transactions per second and perform interactive, ad-hoc analytics on billions upon billions of rows. MariaDB can be deployed on prem-on commodity hardware. It is also available on all major public cloud providers and MariaDB SkySQL, a fully managed cloud database. MariaDB.com provides more information.
  • 11
    Microsoft Intune Reviews
    Modernize IT service delivery to your workplace. Microsoft Intune enables you to simplify modern workplace management and achieve digital transform with Microsoft Intune. Microsoft Intune creates the most productive Microsoft 365 environment that allows users to work on any device or app they choose while protecting their data. Securely manage iOS and macOS devices using a single management solution. Automate deployment, provisioning and policy management. App delivery and updates can be automated. A highly scalable, distributed cloud service architecture ensures you stay up-to-date. The intelligent cloud provides insights and baselines that will help you to set security policies and configure settings. Protect data by ensuring that you don't have to manage the devices of employees or partners who access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 12
    Keyfactor Control Reviews
    You're familiar with the basics. It is nearly impossible to take into account all the factors that will make your devices secure due to tight budgets, hardware limitations, and complex supply chains. It is essential that safety, security, trust, and integrity are all considered when a device is at risk. Keyfactor Control, an IoT Identity Platform for manufacturers, allows them to create high-assurance identities at every stage of the device's lifecycle, from product design to end-of-life. Integrate PKI-based digital identity into every device, from design and manufacturing through the product's lifecycle. Secure identity can be easily integrated into device design and development. It is cost-effective, easy, and scaleable. Secure over-the-air updates, remote management and remote maintenance can reduce the cost of device maintenance. Protect your devices from fraud and tampering and avoid warranty recalls and security breaches.
  • 13
    Datacard Secura Reviews
    Datacard®, Secura™, identity and credential management software revolutionizes the process of issuing and managing highly-secure passports and national IDs, PIV card, and other government credentials. It streamlines the entire process from enrollment, identity verification, approval of applications, document issuance and post-issuance management. You can choose from high volume, desktop, or mobile issuance options. Allows for updates, cancellation, and other post-issuance processes. Pre-configured workflows are faster than custom development. Allows biometric and biographic capture as well as breeder document processing. Interfaces with external sources to verify identities and manage them. Includes business rules, profiles, data preparation capabilities, and other information. The risk of overruns in time and cost is greatly reduced by the absence of customization. Integration with other components of your credential ecosystem is easier when you use a standards-based architecture.
  • 14
    Certbot Reviews
    Certbot is a free, open source software tool for automatically using Let's Encrypt certificates on manually-administrated websites to enable HTTPS. You can use our instruction generator to generate custom commands to install Certbot on your server. Select your server's system and software above. Certbot will retrieve Let's Encrypt certificates. These certificates will be standard Domain Validation certificates. They can be used for any server that uses a domain, such as web servers. These certificates can also be used for other TLS applications like IMAPS. A command line allows you to interact with a computer using text-based commands and receive text-based responses. Certbot runs from a command line interface, usually on a Unix server. You will need to be able install and run Certbot on your web server's command line. This is often accessed via SSH.
  • 15
    Intercede Reviews
    MyID®, credential management software, allows governments and large corporations to issue and manage digital identity using the most secure method for multi-factor authentication to citizens and large workforces. MyID allows millions of people to securely authenticate themselves to the data, systems, and networks they need. MyID makes it easy for those responsible for information security to integrate and manage digital identity management and issuance. MyID allows seamless, secure access to company networks, systems, and resources for citizens and employees using multi-factor authentication via a variety devices. MyID®, a cyber secure credential management solution, is able to address the ever-growing threats of cyber terrorism and identity fraud. MyID is the best choice for data management. MyID software is distinguished by its reliability, security, and interoperability.
  • 16
    Cisco ISE Reviews
    Securing the workplace where everyone and everything connects is an essential component of any zero trust strategy. Cisco Identity Services Engine (ISE), a dynamic and automated method of policy enforcement, simplifies the delivery secure network access control. ISE allows software-defined access and automates network segments within IT and OT environments.
  • 17
    Keyfactor Command Reviews
    Join the top enterprises around the globe that use the most comprehensive and scalable managed PKI as-a-Service. All the benefits of PKI without the complexity PKI is the trusted technology that establishes trust, whether it's for protecting your network, sensitive data or connected devices. However, building and managing your PKI can be a complicated and costly task. It is crucial to do it right, but it is not easy. It is difficult to find and retain the right people with the right skillsets and adhere to industry standards. There are also significant costs associated with hardware and software that are required to run a robust PKI.
  • 18
    AppViewX CERT+ Reviews
    AppViewX CERT+ provides users with a complete-cycle certificate management suite that allows 360-degree control over network infrastructures and visibility. It allows you to manage certificate operations such renewals, revocations, and provisioning through a single interface. It also integrates workflow automation, dynamic monitoring and auditing capabilities. It is designed to be easy and reduce errors, outages, downtime, and downtime that can result from poor management of PKI.
  • Previous
  • You're on page 1
  • Next