What Integrates with Keyfactor Control?
Find out what Keyfactor Control integrations exist in 2024. Learn what software and services currently integrate with Keyfactor Control, and sort them by reviews, cost, features, and more. Below is a list of products that Keyfactor Control currently integrates with:
-
1
Kubernetes
Kubernetes
Free 1 RatingKubernetes (K8s), an open-source software that automates deployment, scaling and management of containerized apps, is available as an open-source project. It organizes containers that make up an app into logical units, which makes it easy to manage and discover. Kubernetes is based on 15 years of Google's experience in running production workloads. It also incorporates best-of-breed practices and ideas from the community. Kubernetes is built on the same principles that allow Google to run billions upon billions of containers per week. It can scale without increasing your operations team. Kubernetes flexibility allows you to deliver applications consistently and efficiently, no matter how complex they are, whether you're testing locally or working in a global enterprise. Kubernetes is an open-source project that allows you to use hybrid, on-premises, and public cloud infrastructures. This allows you to move workloads where they are most important. -
2
Jenkins, the most popular open-source automation server, provides hundreds of plugins that can be used to build, deploy, and automate any project. Jenkins is an extensible automation server that can be used to create CI servers or become the continuous delivery hub for any project. Jenkins is a Java-based program that can be run straight out of the box. It includes packages for Windows, Linux and macOS, as well as other Unix-like operating system packages. Jenkins is easy to set up and configure via its web interface. It also includes built-in help and on-the-fly error checking. Jenkins can be integrated with almost every tool in the Continuous Integration and Continuous Delivery toolchain thanks to the hundreds of plugins available in the Update Center. Jenkins' plugin architecture allows for almost unlimited possibilities. Jenkins makes it easy to distribute work across multiple machines. This helps drive builds, tests, and deployments across multiple platforms more quickly.
-
3
Azure IoT Hub
Microsoft
$10 per IoT unit per month 1 RatingManaged service for bidirectional communication between IoT devices (IoT) and Azure High-secure and reliable communication between your Internet of Things application and the devices it manages. Azure IoT Hub is a cloud-hosted back end that allows you to connect almost any device. Scaled provisioning, device management, per-device authentication and scaled provisioning allow you to extend your solution from the cloud up to the edge. You can use device-to-cloud data telemetry to determine the status of your devices and to define message routes to other Azure services. You can send commands and notifications to your connected devices reliably using cloud-to-device messaging. You can also track the delivery of messages with acknowledgement receipts. To accommodate intermittent connectivity, automatically resend messages to devices. Azure IoT Central - Proof of concept is not your goal. With a hosted IoT platform, we'll help you create industry-leading solutions. -
4
App-centric technology requires advanced technology. Apps are your business. BIG-IP application services offer the performance, availability, and security that you need to meet your business needs. Big-IP application delivery controllers will keep your apps running. BIG-IP Local Traffic Manager and BIG-IP DNS manage your application traffic and protect your infrastructure. No matter if your applications are in a private or public data center, you'll have built-in security and traffic management. BIG-IP Traffic Management, BIG IP Policy Enforcement Manager (PEM), BIG-IP Carrier Grade NAT (CGNAT), and BIG IP Diameter Traffic Management (PEM) manage your network resources to ensure that your applications perform at carrier-grade levels. They can also help you optimize your network and monetize it, improving your bottom line.
-
5
Connect, secure, manage, and monitor services. Traffic routing rules in Istio allow you to control traffic flow and API calls between services. Istio makes it easier to configure service-level properties such as circuit breakers, timeouts and retries. It also makes it simple to set up important tasks such as A/B testing, canary rollsouts and staged rollouts that are percentage-based. It also offers out-of-box disaster recovery features that make your application more resilient against network or dependent services failures. Istio Security offers a comprehensive security solution that addresses these issues. This page outlines how Istio Security features can be used to protect your services, no matter where they are hosted. Istio security protects your data, communications, and platform from both insider threats and outsider attacks. Istio provides detailed telemetry for all service communications within the mesh.
-
6
Docker eliminates repetitive, tedious configuration tasks and is used throughout development lifecycle for easy, portable, desktop, and cloud application development. Docker's complete end-to-end platform, which includes UIs CLIs, APIs, and security, is designed to work together throughout the entire application delivery cycle. Docker images can be used to quickly create your own applications on Windows or Mac. Create your multi-container application using Docker Compose. Docker can be integrated with your favorite tools in your development pipeline. Docker is compatible with all development tools, including GitHub, CircleCI, and VS Code. To run applications in any environment, package them as portable containers images. Use Docker Trusted Content to get Docker Official Images, images from Docker Verified Publishings, and more.
-
7
Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro is the Apple device management tool that empowers IT pros and the users they support by delivering on the promise of unified ecosystem management for Apple devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily.
-
8
Symantec Endpoint Protection
Broadcom
2 RatingsSymantec Endpoint Security is the best integrated endpoint security platform available. Symantec Endpoint Security is available as an on-premises, hybrid or cloud-based platform. It protects both your mobile and traditional endpoint devices and uses artificial intelligence (AI), to optimize security decisions. Unified cloud-based management makes it easy to detect, protect and respond to advanced threats that target your endpoints. Keep your business running. Compromised endpoints can be disruptive to your business. Innovative attack prevention and attack surfaces reduction provide the best security throughout the attack life cycle (e.g. stealthy malware and credential theft, fileless and "living off the land". Avoid the worst-case scenario. Full-blown breaches are CISOs worst nightmare. Provide detection and remediation for persistent threats using sophisticated attack analytics and prevention from AD credential theft. -
9
GoDaddy Website Security
GoDaddy
$5.59 per month 5 RatingsGet peace of mind and protect your site. Ultimate plans now include a free SSL certificate You can monitor, alert, and clean your site. Also, you get advanced security protection and speed boost. Website repair expedited. The fastest response time. Your site is monitored, cleaned, and alerted. Protection for unlimited pages within one website. Advanced security issues can be handled by security analysts. Advanced security monitoring. Google blacklist monitoring and removal. Monitoring of brand reputation. Unlimited malware removal and hack repair Trusted site seal. 100% clean site - guaranteed. 30-day money back guarantee. Compatible with most CMS sites and custom-coded websites. Advanced protection and speed boost. (Deluxe to Ultimate and Express) CDN performance accelerator, Advanced DDoS mitigation. (Deluxe and Ultimate, as well as Express). -
10
ServiceNow
ServiceNow
$100 per month 1 RatingDigitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise. -
11
IdenTrust Trust Sign
IdenTrust
$54 per year 1 RatingIndividuals and organizations can use IdenTrust digital document signature certificates to replace wet-ink signatures and create legally binding digital signatures that are non-repudiable and legally binding. Digital signing businesses are a great way to streamline processes in today's remote workplace. They can sign off employee timesheets, approve financial documents, and execute legal or sales contracts. Digital signatures can easily be performed remotely from any computer, laptop, or other portable device that has the document signing certificate. -
12
Axonius
Axonius
Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. -
13
EJBCA
Keyfactor
EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors. -
14
Azure Key Vault
Microsoft
Key Vault helps you to improve data protection and compliance To protect cloud data, secure key management is crucial. Azure Key Vault can encrypt keys and small secrets, such as passwords, that are stored in hardware security module (HSMs). You can import or generate keys in HSMs for additional security. Microsoft processes your keys using FIPS validated HSMs (hardware, firmware, and hardware) - FIPS 140-2 level 2 for vaults, and FIPS 140-2 level 3 for HSM pools. Microsoft can't see your keys or extract them with Key Vault. You can monitor and audit key usage with Azure logging-pipe logs to Azure HDInsight, or your security information management (SIEM), for more analysis and threat detection. -
15
Certificate Authority Service
Google
$20 per CA per monthCertificate Authority Service (CAS) is a highly-available, scalable Google Cloud Service that allows you to automate and customize the deployment and management of private certificate authorities. Cloud service simplifies the deployment, security, and management of your enterprise PKI. It automates time-consuming, error-prone, and risky infrastructure tasks. Certificate Authority Service can be customized to meet your needs. This includes configuring custom certificates and CAs, enforcing access controls at granular levels, automating common tasks using APIs, and integrating your existing systems. You can rest assured that your CA service will be highly available, scalable and backed by a SLA. It will also be auditable and ready to assist you in achieving compliance with advanced hardware or software security controls. Create a private CA within minutes, rather than the days or weeks it would take to deploy and manage your own CA. -
16
Datacard ID Works
Entrust
ID Works Photo Identification Software Support Solutions Create high-quality cards quickly and securely using ID Works®. You will enjoy the functionality, flexibility, and scalability required to seamlessly create card designs, reports, forms, and databases. You don't need to upgrade to v6.5 if you are still using ID Works v6.0 software. Do not upgrade if you do not have a compatible card printer driver for Vista or if TruFinger Print is your preferred solution. TruPhoto solution must be v6.5 or higher. TruSignature solution must be v6.5. Vista compatible components are required for the solution's operation on Vista. -
17
HashiCorp Vault
HashiCorp
Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API. -
18
Sectigo
Sectigo
$125Security solutions for websites, connected devices and applications are a global leader. Sectigo is a leader in digital identity solutions. This includes SSL / TLS certificates and DevOps, IoT and enterprise-grade PKI management. Sectigo is the largest commercial Certificate Authority in the world, with over 700,000 customers and more than 20 years of experience in online security. Sectigo partners with all sizes of organizations to provide automated public and private PKI solutions that secure web servers, user access and connected devices. Sectigo is known for its innovative products and world-class customer service. This company has the proven ability to secure the digital landscape of tomorrow and today. Sectigo is the market leader for SSL / TLS certificates and DevOps. -
19
Microsoft Intune
Microsoft
Modernize IT service delivery to your workplace. Microsoft Intune enables you to simplify modern workplace management and achieve digital transform with Microsoft Intune. Microsoft Intune creates the most productive Microsoft 365 environment that allows users to work on any device or app they choose while protecting their data. Securely manage iOS and macOS devices using a single management solution. Automate deployment, provisioning and policy management. App delivery and updates can be automated. A highly scalable, distributed cloud service architecture ensures you stay up-to-date. The intelligent cloud provides insights and baselines that will help you to set security policies and configure settings. Protect data by ensuring that you don't have to manage the devices of employees or partners who access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices. -
20
ThingWorx
PTC
The industrial Internet of Things, or IIoT, connects people, products and processes to enable digital transformation. Companies can connect, monitor, analyze and act on data using industrial IoT platforms. Digital transformation can be done quickly by using IoT to pilot strategic initiatives and then easily scaling up solutions to reshape an organization. The industrial IoT is critical for leaders. It affects everything from how they design, produce, and service products to how they create value and interact with customers. A proven industrial IoT platform, designed specifically for you, is the best way to accelerate digital transformation. You can scale to new markets, increase throughput, and unlock new business models like products as a services. Rapid application development speeds you to market. You can wrap legacy assets and extend them with industrial Internet of Things platforms for new functionality. -
21
AWS Certificate Manager
Amazon
AWS Certificate Manager allows you to easily create, manage, and deploy private and public Secure Sockets Layer/Transport Layer Security certificates (SSL/TLS), for use with AWS services as well as your internal resources. SSL/TLS certificates can be used to protect network communications and establish the identity websites on the Internet. AWS Certificate Manager automates the tedious manual process of purchasing, uploading and renewing SSL/TLS certificate. -
22
wolfSSL
wolfSSL
wolfSSL, an open-source internet security company, is best known for its embedded SSL Library. Its primary users include programmers who integrate security functionality into their devices and applications. wolfSSL uses the dual licensing model like MySQL. It is available under commercial license terms to our commercial users and open source to the open source community. wolfSSL also offers consulting and support. wolfSSL is the most widely used SSL/TLS security option in the IoT. We protect devices from the most common threat vector in the IoT, the MITM (man-in-the middle) attack. wolfSSL is popular for heavy load server-side or cloud environments where cryptography performance are critical. FIPS 140-2-enabled, wolfSSL embedded SSL is also used by government applications. Over 2 billion devices and applications are protected with wolfSSL products. -
23
Tetrate
Tetrate
Connect and manage applications across clouds, clusters, and data centers. From a single management platform, coordinate app connectivity across heterogeneous infrastructure. Integrate legacy workloads into your cloud native application infrastructure. To give teams access to shared infrastructure, define tenants within your company. From day one, audit the history of any changes to shared resources and services. Automate traffic shifting across failure domains, before your customers notice. TSB is located at the application edge, at cluster entry, and between workloads within your Kubernetes or traditional compute clusters. The edge and ingress gateways route traffic and load balance it across clouds and clusters, while the mesh controls connectivity between services. One management plane can configure connectivity, security, observability, and other features for your entire network. -
24
DigiCert Secure Site
DigiCert
Reduce the complexity of web security. Security without compromising. For expertise in all areas of risk management, you can rely on the most trusted web security company in the world. Encryption is just the beginning. Diversify your protection against all threats to website. To maintain app integrity, find weaknesses and resolve issues faster, you can get a single view of all your security information. Your web security can be scaled to meet threats and business growth. Protect your web with speed and ease. To minimize the damage caused by sophisticated threats increasing in sophistication, strengthen your overall security posture. Complete Website Security allows you to free up resources for strategic initiatives, simplify security complexities, manage your business with confidence, and increase your business's efficiency.
- Previous
- You're on page 1
- Next