Best Smallstep Certificate Manager Alternatives in 2024
Find the top alternatives to Smallstep Certificate Manager currently available. Compare ratings, reviews, pricing, and features of Smallstep Certificate Manager alternatives in 2024. Slashdot lists the best Smallstep Certificate Manager alternatives on the market that offer competing products that are similar to Smallstep Certificate Manager. Sort through Smallstep Certificate Manager alternatives below to make the best choice for your needs
-
1
Sectigo
Sectigo
$125Security solutions for websites, connected devices and applications are a global leader. Sectigo is a leader in digital identity solutions. This includes SSL / TLS certificates and DevOps, IoT and enterprise-grade PKI management. Sectigo is the largest commercial Certificate Authority in the world, with over 700,000 customers and more than 20 years of experience in online security. Sectigo partners with all sizes of organizations to provide automated public and private PKI solutions that secure web servers, user access and connected devices. Sectigo is known for its innovative products and world-class customer service. This company has the proven ability to secure the digital landscape of tomorrow and today. Sectigo is the market leader for SSL / TLS certificates and DevOps. -
2
EJBCA
Keyfactor
EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors. -
3
AppViewX CERT+
AppViewX
AppViewX CERT+ provides users with a complete-cycle certificate management suite that allows 360-degree control over network infrastructures and visibility. It allows you to manage certificate operations such renewals, revocations, and provisioning through a single interface. It also integrates workflow automation, dynamic monitoring and auditing capabilities. It is designed to be easy and reduce errors, outages, downtime, and downtime that can result from poor management of PKI. -
4
StrongKey
StrongKey
StrongKey has been in PKI for nearly 20 years. We have implemented PKI across the globe in a variety of applications. StrongKey Tellaro is a complete public key infrastructure (PKI), platform for managing keys, and digital certificates. Customers can issue digital certificates using our Tellaro E Series based on securely generated public key. The HSM stores private keys and generates them. Our PKI management solution integrates seamlessly with TLS/SSL and identity access management (IAM), digital signing, secrets management, device management systems, and other security protocols. StrongKey Tellaro provides strong authentication, encryption tokenization, PKI management and digital signature management. Open-source software that includes a FIDO®, Certified FIDO2 Server, and supports flexible data center deployment models. -
5
Secardeo TOPKI
Secardeo
Digital certificates provide high security for encryption, strong authentication, and digital signatures. You need the right services for key management and certificate management in an enterprise PKI. TOPKI (Trusted Open PKI), a PKI platform that distributes X.509 certificates to all users and devices, and provides private keys as well. TOPKI has components that can be used to manage specific aspects of the certificate lifecycle. TOPKI's PKI software components can be integrated with Active Directory, other PKI systems, and Mobile Device Management systems. TOPKI allows seamless adoption of managed PKI services. This allows you to request certificates from trusted public CAs located in the cloud. Open source CAs can also be used to auto-enroll internal certificates. TOPKI PKI products are also available to enhance your existing Microsoft Public Key Infrastructure (PKI). -
6
HID IdenTrust
HID
Complete lifecycle management for every certificate in your network, whether it is cloud-based or on-premise. You can easily migrate from an existing certificate authority using policy-based automated renewal, issuance and revocation. This eliminates manual processes and other errors. Enterprises increasingly rely upon public key infrastructure (PKI), which is used to protect machines, devices, and people using keys and digital certificate. HID IdenTrust, in partnership with Keyfactor offers a way for enterprises to simplify PKI and automate the management of certificate lifecycles at scale. HID IdenTrust offers cloud-based managed PKI that can issue digital certificates to U.S. Government interoperables (FBCA) to secure websites, networks, IoT devices and workforce identities. You can find every certificate across cloud and network environments with real-time inventory and distributed SSL/TLS discovery tools. -
7
Keyfactor Command
Keyfactor
Join the top enterprises around the globe that use the most comprehensive and scalable managed PKI as-a-Service. All the benefits of PKI without the complexity PKI is the trusted technology that establishes trust, whether it's for protecting your network, sensitive data or connected devices. However, building and managing your PKI can be a complicated and costly task. It is crucial to do it right, but it is not easy. It is difficult to find and retain the right people with the right skillsets and adhere to industry standards. There are also significant costs associated with hardware and software that are required to run a robust PKI. -
8
GlobalSign
GlobalSign
GlobalSign is the world's leading provider of security and trusted identity solutions. GlobalSign enables large enterprises, cloud service providers, and IoT innovators worldwide to secure online communications, manage millions digital identities, and automate authentication/encryption. Its high-scale Public Key Infrastructure and identity solutions support billions of people, devices, and things that make up the Internet of Everything (#IoE). GlobalSign, an identity services company, provides cloud-based, highly scalable, PKI solutions to enterprises that need to conduct safe commerce and communications. Our identity and security solutions allow large enterprises, cloud-based service provider, and IoT innovators all over the world to securely communicate online, manage millions of digital identities, and automate encryption and authentication. -
9
This document provides an overview on Active Directory Certificate Services (AD CS), in Windows Server®. AD CS allows you to create a public key infrastructure (PKI), and provide digital certificates, digital signature capabilities, and public key cryptography for your organization. AD CS offers customizable services to issue and manage digital certificates that are used in software security systems that use public key technologies. AD CS offers digital certificates that can be used to encrypt or digitally sign electronic documents. These digital certificates can be used to authenticate computer, user, and device accounts on a network. AD CS can be used to increase security by binding the identity a person, device or service to a corresponding key. AD CS allows you to manage the distribution of certificates in a cost-effective, secure, and efficient manner.
-
10
KeyTalk
KeyTalk
KeyTalk is independent from Certificate Authorities and linked with a large number public CAs, both Digicert QuoVadis and GMO GlobalSign. Even though there are thousands of certificates and endpoints involved, switching between CAs is easy and straightforward. This means that vendor lock-in is no longer possible. KeyTalk has an internal CA that generates private certificates and keys. Have you ever used public certificates that were expensive for internal purposes? Did you find it difficult to use Microsoft CS or other private CAs for internal purposes? You will love our internal CA, private PKI certificate issuing. KeyTalk tracks the lifecycle of certificates in an automated manner. This allows you to have a complete overview of all certificates, including their validity, SAN, and name. You can also include used crypto keys and algorithms for internal and external certificates. -
11
Certificate Authority Service
Google
$20 per CA per monthCertificate Authority Service (CAS) is a highly-available, scalable Google Cloud Service that allows you to automate and customize the deployment and management of private certificate authorities. Cloud service simplifies the deployment, security, and management of your enterprise PKI. It automates time-consuming, error-prone, and risky infrastructure tasks. Certificate Authority Service can be customized to meet your needs. This includes configuring custom certificates and CAs, enforcing access controls at granular levels, automating common tasks using APIs, and integrating your existing systems. You can rest assured that your CA service will be highly available, scalable and backed by a SLA. It will also be auditable and ready to assist you in achieving compliance with advanced hardware or software security controls. Create a private CA within minutes, rather than the days or weeks it would take to deploy and manage your own CA. -
12
Certicom Managed PKI Service
Certicom
Digital certificates can be used to establish trust between communicating entities, both on the Internet and within private networks. They are becoming increasingly important in securing IoT applications that use wireless sensor networks and smart connected devices. Each endpoint represents an attack surface. This growing attack surface should be considered when designing your security architecture. It is often difficult and costly to manage certificates for an organization using an in-house Public Key Infrastructure. Certicom makes it simple by providing a reliable and secure hosted PKI platform that can manage certificates for an entire organization or an entire ecosystem. This service reduces the upfront cost and keeps certificates in good condition. Customers can also use it to secure their devices and quickly get their products on the market. -
13
Keyhub
Remme
Autopilot Certificate Management. Keyhub is a cloud-based platform that automatically finds, organizes, and tracks SSL/TLS certificates in an enterprise. Eliminate the guesswork. What number of digital certificates are present in your environment? 71% of organizations don’t know the exact answer. You can't protect something you don't know. Real-time automatic discovery. Holistic view of certificates from multiple issues. Management of private and public certificates. Identification of vulnerabilities and issues. Alerting and tracking expiration dates. Compliance check for corporate policy. Keyhub is based on design thinking principles and simplifies routine operations. It also reduces adoption times and speeds up digital transformation. You can identify every certificate, both known and unknown, by performing a permanent auto scan in your external and inner environments. -
14
AWS Certificate Manager
Amazon
AWS Certificate Manager allows you to easily create, manage, and deploy private and public Secure Sockets Layer/Transport Layer Security certificates (SSL/TLS), for use with AWS services as well as your internal resources. SSL/TLS certificates can be used to protect network communications and establish the identity websites on the Internet. AWS Certificate Manager automates the tedious manual process of purchasing, uploading and renewing SSL/TLS certificate. -
15
Nexus Smart ID Corporate PKI
Nexus Group
Smart ID Corporate PKI allows you to issue, manage, and automate PKI certificate for people, devices, and services. This will enable strong authentication, data confidentiality and integrity, as well as digital signatures. A corporate public-key infrastructure is able to issue and manage trusted identities for individuals, devices, and services. This forms the foundation of information security within an organization. Smart ID provides a solid foundation that includes roles, policies, and procedures for issuing and managing certificate-based trusted identities. Smart ID corporate PKI can be used by any organisation to issue, manage, and validate digital certificates for mixed environments, including people, infrastructure, and things. Based on proven products in business-critical environments, and made in Sweden. -
16
Dogtag
Dogtag
Dogtag Certificate System (CA) is an enterprise-class, open-source Certificate Authority (CA). It is a fully-featured system that has been tested in real-world deployments. It supports all aspects related to certificate lifecycle management including key archival and smartcard management. You can download the Dogtag Certificate System for free and have it set up in under an hour. Dogtag is a set of technologies that allows enterprises to deploy PKI at large scale. Certificate issuance, revocation and retrieval. Generation and publication of the Certificate Revocation List (CRL). Certificate Profiles. Simple Certificate Enrollment Protocol (SCEP). Local Registration Authority (LRA), for policies and organizational authentication. Recovery and archival of encryption keys. Smartcard lifecycle management. Token profiles, token enrollment and key recovery. Format. Face-to-face enrollment via the security officer interface. -
17
GaraSign
Garantir
There are many great enterprise security tools available. Some tools can be managed on-premise while others are available as a subscription. Others still use a hybrid model. The problem enterprises face isn't a lack in tools or solutions but a lack a seamless interconnectivity between these privileged management tools and a single place for managing and auditing them. GaraSign allows enterprises to integrate their security systems securely and efficiently in a way that doesn't disrupt existing business processes. GaraSign can centralize and simplify enterprise's most sensitive areas. This includes privileged access management (PAM), secure software development, privileged identity management, code signing, data security and PKI & SSM solutions. DevSecOps and many more. Security leaders in enterprise must be attentive to data security, privileged identity management (PAM), and other areas. -
18
emCA
eMudhra
Our Certificate Engine includes Server Certs as well as IP Certs and User Certs. Connect to eMudhra CertiNext for a fully automated management of certificates. emCA's Certificate Engine is unmatched in its intuitiveness. It offers a 3-click process for almost any activity. It's a PKI platform that anyone can use. From managing cert profiles to setting up hierarchies and admin settings. emCA is compatible with a variety of HSMs, Databases, and Operating Systems. It allows you leverage your cloud, hybrid or on-prem architecture to optimize your costs, manage your internal security and compliance requirements, and evolves along with your organization's cloud and security posture. -
19
Comodo Certificate Manager
Comodo
Advanced Certificate Management and Lifecycle Management. All your SSL Digital Certificates can be found and managed automatically. Secure, reliable, and centrally managed platform. Allows you to administer, immediately provision and control all SSL/PKI. Expired SSL certificates can cause systems and services to fail, and your trust in your business to sink. It's going to be harder to keep track of digital certificates and renew dates. A mechanism is needed to effectively administer certificates. Flexible and reliable system to manage the lifecycle and issue of digital certificates. It centralizes and automates the management of digital certificates and cryptographic keys. It ensures that certificates don't expire unintentionally. Secure, cloud-based administration. Integration with Microsoft Active Directory. Certificate Discovery Tool searches for all certificates, regardless of who issued them. Administrative protection with two-factor authentication. -
20
TRUSTZONE
TRUSTZONE
€299 per user per yearTRUSTZONE is the Scandinavia's largest SSL/TLS certificate provider and a leading provider IoT and scalable PKI solutions for encryption, authentication and automated certificate management. With a full suite of compatibility-optimized, fully scalable certificate products and solutions, we offer custom options for companies and organizations across industries. All sizes of companies can benefit from our options, whether they are small startups or businesses with just one employee who need one or two SSL/TLS certificate certificates, to large multinational corporations looking for enterprise-grade solutions. We have more 15 years of experience in certificate management, SSL/TLS, PKI and PKI. We have served more than 3,000 companies of all sizes with certificates. More than 80% of Danish banks are protected by TRUSTZONE certificates. -
21
CertHat
ProMDM
Invalid or expired digital certificates can cause system downtime and business disruptions. You can evaluate CertHat Tools to Microsoft Active Directory Certificate Services (AD CS), and make an informed purchase decision during a 30-day free trial. You can evaluate CertHat Tools to Microsoft Active Directory Certificate Services (AD CS), and make an informed purchase decision during a 30-day free trial. If you decide to purchase a full CertHat licence, you can convert your Trial installation to a production instance by simply entering a valid key into the product. -
22
DigiCert ONE
DigiCert
You can be flexible and fast, and have total control over all users and systems. It is part of DigiCert ONE and the modern approach to PKI. It's the most flexible solution to identifying, validating, and protecting all your users, systems, and devices. DigiCert Enterprise PKI manager is available wherever you are. It was designed from the ground up for the most stringent local and regional deployment requirements. You have the option to deploy in-country, air-gapped or hybrid cloud services. ICA creation is dynamic and nearly instantaneous with advanced permissions. Access control is also available. Docker containerization allows for a small footprint and the ability scale up or down to meet your changing needs. Continuous updates and automatic orchestration ensure that your business-critical applications are always secure and optimized. Complexity is the greatest security challenge facing any IoT initiative. DigiCert IoT device manager makes it easy to identify, manage, control, and secure all connected devices from one location. -
23
ManageEngine Key Manager Plus
Zoho
$595 per yearManageEngine Key Manager Plus, a web-based solution for key management, helps you to consolidate, control and manage SSH (Secure Shell), SSL (Secure Sockets Layer), and other certificates throughout their entire lifecycle. It gives administrators visibility into SSH and SSL environments, and helps them take control of their keys to prevent breaches and compliance issues. It can be difficult to manage a Secure Socket Layer environment when there are many SSL certificates from different vendors, each with a different validity period. SSL certificates that are not monitored and managed could expire or invalid certificates could be used. Both scenarios can lead to service outages or error messages, which could destroy customer confidence in data security. In extreme cases, this may even result in a security breach. -
24
AVX ONE
AppViewX
AVX ONE provides the most advanced SaaS platform for certificate lifecycle management. It is designed to meet the needs of enterprise PKI, IAM and security teams, DevOps teams, cloud, platform, and application teams. AVX ONE provides visibility, automation, and control over certificates and keys to enable crypto-agility. This allows users to quickly respond to cryptographic changes and threats, prevent outages, and prepare for Post-Quantum Cryptography. AppViewX is a unified platform that provides instant value through enterprise-wide CLM and Kubernetes/container TLS automation, scalable PKI-as-a-Service and easy Microsoft PKI Modernization, secure code-signing, IoT Identity Security, SSH Management, and Post-Quantum Cryptography readiness (PQC). -
25
Acmetek
Acmetek
Acmetek is an authorized distributor of DigiCert website security products and a platinum partner. We offer all four brands of SSL certificates DigiCert (Thawte), GeoTrust (and RapidSSL). Our trusted seals increase customer confidence which increases online sales and boosts your business growth. Acmetek began its journey into Website Security Solutions in 2010 primarily focusing on SSL because of a simple observation: SSL technology has advanced over the years, but technology, distributors and businesses have not yet adopted it. Acmetek's founders saw this gap and developed a channel enablement model to help them. Businesses can easily implement SSL using our powerful enablement model. Partners can offer SSL to their clients around the world with our integrated set of tools and support. Our mission is to make the world safer and transform businesses. -
26
CertiNext
eMudhra
A Certificate Lifecycle Management with Key Management. Generate and rotate keys seamlessly. Encrypt and Decrypt Data Securely. CertiNext supports AES, RSA, and ECDSA keys to meet your key management requirements. This ensures that your keys and, therefore, your data, are always protected. CertiNext Key Management includes KMIP support, which allows you to automate key management directly from CertiNext. This ensures that your ecosystem is always secure. Manage your key rotation policy directly from the dashboard. Lost your keys? You can easily recover your keys and/or reissue them. CertiNext allows you to store keys in an encrypted form on your App Server, or alternatively in secure hardware. You can manage keys distribution to meet your business needs from the dashboard. -
27
KeyScaler
Device Authority
KeyScaler®, a purpose-built IAM platform that focuses on device identity and is compatible with IoT/Blockchain, is available. It allows customers secure registration, provisioning, and connection of devices to IoT applications, platforms, and services. The platform makes it easy to establish a solid, end-to-end security architecture for the IoT. It also delivers efficiencies at scale via security automation without the need for human intervention. This is due to the IoT's dynamic scale, where new devices are being provisioned constantly, and it quickly becomes difficult to manage without automation. The IoT requires a method of identification that starts with individual devices. These devices can be authenticated automatically and dynamically without any manual intervention. Device Authority has created a flexible protocol for interface with KeyScaler®, which allows for the delivery of automated PKI for IoT device - offering two options for device authentication. -
28
Entrust Certificate Hub
Entrust
1 RatingManage your certificates by automating, controlling and finding them. Certificate Hub allows you to manage all your digital certificates from one portal. Certificate Hub manages all aspects of digital certificates, from discovery and audit to issuance or orchestration. Certificate Hub makes it easy and intuitive for your entire organization to manage certificates. Certificate Hub centralizes certificate lifecycle management across multiple CAs. This makes it easy to locate and control all digital certificates within your infrastructure. Certificate Hub scans your CA databases and networks for information about certificates. Your team is kept informed and accountable with automated notifications and reports. With a browser-based interface, you can find, control, and manage all aspects of your certificates across multiple CAs. Certificate Hub is container-based and can be used for commercial cloud hosting or on-premises. -
29
DigiCert CertCentral
DigiCert
CertCentral streamlines the entire lifecycle of certificates by consolidating tasks for issuing and installing, inspecting, inspecting, remediating and renewing them. All aspects of the cycle are accessible from one window. ACME + CertCentral allows you to automate deployment with virtually any client or server type. This means you can spend less time doing manual tasks, or worse, putting out flames. DigiCert uses ACME protocol to automate the deployment of OV certificates and EV certificates. These benefits are endless. Contact your sales rep to enable ACME in CertCentral. Previously, there were two major bottlenecks when it came to certificates: renewal and approval. These tasks can now be automated in just a few clicks. If this were a race you would be the winner. Get alerts about possible vulnerabilities and know when each certificate is about to expire. Because guessing is gambling. -
30
Entrust Identity Enterprise
Entrust
Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one. -
31
SecureW2
SecureW2
A 2020 IBM report showed that credential compromise costs averaged $2.35M even for companies with fewer than 500 employees. Use x.509 certificates to eliminate the threat. Utilize your existing Wi Fi, Web, Firewall, and VPN infrastructure with zero technology upgrade. SecureW2 allows you to verify that only trusted users or devices have access to your network and applications. It's now easier than ever to enable 802.1x in cloud. SecureW2 allows you to use your Okta, Google, or Azure account to enroll and manage certificates for Wi-Fi authentication. It also includes the only Dynamic Cloud RADIUS server in the world, which gives you everything you need to secure WPA2-Enterprise network authentication. You can easily connect to any major operating system and provide secure connections without any IT hassle. You can secure your network with certificates that use the generation, delivery and authentication technology. -
32
CertSecure Manager
Encryption Consulting LLC
A single solution for certificate management, which helps automate and manage all certificates across Cloud Environments, On Premises, Hybrid IT Environments, and Kubernetes Clusters. It manages certificates throughout their entire lifecycle, including certificate issuance and monitoring, renewal, and revocation. -
33
Entrust TLS/SSL Certificates
Entrust
$199Entrust TLS/SSL Certificates offer validation of identity and encryption to protect your website, users, and data. Entrust TLS/SSL Certificates will secure your website so that your visitors can feel confident in knowing that your organization's identity has been verified. Also, encryption will protect their data and transactions. Entrust TLS/SSL Certificates ensure that your visitors don't see any browser alerts advising them that their website is "not secure" and that their connection is not private. Entrust is a founding member the CA Security Council, the CA/Browser Forum and actively contributes in the development of industry standards for TLS/SSL and S/MIME, code signing certificates and code management. Trust your digital security to a Certification Authority. -
34
It's better to be safe that sorry when it comes to protecting your business. It's not possible to trust every user who accesses your network, or devices. Managed Certificate Services (MCS) allows you to authenticate users and protect your network, devices and applications instantly using a trusted digital certificate source. We have one of the most extensive IP networks that supports many Fortune 1000 companies. This means we understand the importance to provide robust security solutions in this age of digital transformation. MCS is your certificate manager. This allows you to balance high-quality security with speed to business. MCS is an automated authentication system for your certificate chain. It provides full lifecycle management for all digital certificates, corporate, user and application, device, service, and machine throughout the enterprise.
-
35
Nebula
Defined Networking
Nebula is a network management platform that allows innovative companies to manage their networks. After years of R&D, Slack opened sourced the project and began deploying it at scale. Nebula is a lightweight service, which is easy to distribute and configure on modern operating system. It can be used on a variety of hardware, including x86, arm and mips. Traditional VPNs have performance and availability bottlenecks. Nebula is not centralized: Encrypted tunnels can be created per-host or on-demand as required. Nebula was created by security engineers. It uses trusted crypto libraries (Noise), has a firewall with granular security groupings, and uses the best bits of PKI to authenticate hosts. -
36
DocRAID
AvailabilityPlus
$24 per monthMulti-award-winning, CloudRAID driven security. Reliable, yet simple file sharing. You can use it on your metal, or in our data centers. Zero-knowledge-Storage. Email protection. No software installation is required by the receiver. CloudRAID based, highly resilient, yet easy-to-use email encryption gateway. No software to install, no PKI needed. No software installation. No hassles. All email clients are supported. All devices. All devices are ready to be protected in minutes. Software to detect vulnerabilities and harden critical infrastructures. In-built cooperation with the German Federal Office for Information Security. Your attack surface is reduced by fragmentation, encryption, and redundant distribution. DocRAID®, the leader in CloudRAID technology, is DocRAID®. Your files are protected during transport and at rest with fragmentation, encryption and redundant distribution. Redundant distribution to multiple jurisdictions of encrypted data fragments adds an additional layer of protection. -
37
everID
Datarella
Decentralized public key technology is a fundamental tool that allows users to authenticate without relying upon a trusted central authority. Private keys give users access to and control of their accounts, assets, and digital identity (SSI). EverKEY, our Decentralized Key Recover solution, is available within everID for wallets and products that require highly secure keys management. -
38
Venafi
Venafi
Protect all your machine identities. Are you protecting your TLS keys and certificates as well as SSH keys, code signing keys and code signing keys that are used throughout your extended enterprise? Learn how to secure this torrent of constantly changing machine identities. Keep ahead of outages and speed up DevOps security. The Trust Protection Platform powers enterprise solutions that provide visibility, intelligence, and automation to protect machine identity throughout your organization. You can also extend your protection by utilizing hundreds of integrated third-party applications (CAs) and certificate authorities (OTCs) that are out-of-the box. Multiple methods are available to find and provide keys and certificates. Security best practices for certificates should be followed and enforced. Integrate workflow management processes and management of certificate lifecycles. Combine certificate automation and orchestration of keys generated using Hardware Security Modules (HSMs). -
39
DigiCert IoT Device Manager
Digicert
You can easily identify, manage, control, and secure all connected devices from one location. Every day, new ways are invented to connect devices. According to recent estimates, 75 billion devices will be online by 2025. A trusted, flexible, scalable and trustworthy solution is required to secure so many devices with their unique manufacturing processes, electronics, software, functions, and lifecycles. DigiCert IoT device manager is flexible enough to keep up with the changing landscape of IoT. It can manage all your devices regardless of how they were built, what they do, or how many you send to the world. DigiCert IoT device manager uses modern PKI to meet even the most complex IoT deployments. IoT Device Manager is a simple and scalable solution that can be used for everything: silicon injection, sunsetting, manufacturing floor, field, single remediation, or the almost simultaneous issuance of millions certificates. -
40
4identity
Bit4id
4identity is a technological solution by Bit4id that empowers web apps with Digital Signature and Authentication processes. 4identity doesn't use Java Applets, or any third-party add-on. It is easy to use, compatible with all web browsers and works under all major operating systems. It uses a simple API to add Digital Signature and Strong Authentication web applications. 4identity is usability and provides a "1-click signing” user experience. Bit4id has extensive experience in the development and maintenance of tools and software for digital identity management and security based on Public Key Infrastructure. Bit4id is a leader in innovation in the PKI and digital identity markets in Europe and Latin America, providing solutions for managing over 10 million digital identities and processing more 50 million digital signatures per year. -
41
Userify
Userify
You can manage SSH keys for your team across continents and clouds using Ansible. Userify is able to work seamlessly across multiple clouds and high latency networks. Hardened. Curve 25519, bcrypt. HIPAA and PCI-DSS compliant. AICPA SOC-2 Type 1 certified. More than 3,500 companies have deployed the software on every continent. Logins to Userify SSH Key are passwordless and more secure. Convenient. Userify is the only key manager that can operate over the Internet. How do you de-provision admins after they leave? It's easy with Userify. Userify is AICPA SOC-2 Type 1, certified and has achieved PCI DSS and HIPAA compliance. Userify can help you comply with PCI-DSS Requirement 8 even on cloud systems, protect PII and ban ec2-user forever. Userify will help you comply with the HIPAA Security Rules and protect your critical healthcare systems and personal information by restricting access and authority. -
42
GlobalSign IoT Edge Enroll
GlobalSign
Properly enrolling devices in PKI is crucial to provision unique, strong and secure identities. IoT Edge Enroll, a fully-featured registration authority service, ensures easy, secure, and optimized device enrollment. It is a key component in our PKI-based IoT Identity Platform, which enables Device Identity Lifecycle Management. It is the most flexible and comprehensive commercial PKI device enrollment feature available. Certificate Templating Engine to Exact Enrollment – Use custom certificate fields and data for maximum flexibility in meeting your IoT authentication needs. Device Identity Manager for Admin Control - Manage unique device identities throughout their lifecycles including certificate auditing and reporting, device whitelist management, device enablement/disablement and enrollment eligibility. -
43
Cloud hosting is a great way to increase your hosting performance. Our cloud infrastructure is highly available, managed, and easily scalable. You can host your websites and applications. We offer private clouds and virtual servers (VPS) for Linux and Windows High Availability. All offered by our experienced experts at the most competitive rates. Are you looking for a dedicated server with US-based location? Our dedicated server plan for the US starts at $105/month. Upgrade your website today to a dedicated server. Only $89 per month for a dedicated server plan with 32GB RAM We offer a wide selection of high-end dedicated servers for Germany.
-
44
Accops HyID
Accops Systems
Accops HyID, a futuristic access and identity management solution, protects business applications and data against misuse by internal and external users. It manages user identities and monitors user access. HyID gives enterprises strong control over endpoints. It allows for contextual access, device entry control, and flexible policy framework. The MFA works with all modern and legacy apps as well as cloud and on-prem apps. It provides strong authentication using OTP sent via SMS, email, and app, biometrics, device hardware ID and PKI. Single sign-on (SSO), provides greater security and convenience. Organizations can monitor the security status of endpoints, including BYOD, and grant or deny access based upon real-time risk assessment. -
45
GlobalSign IoT Identity
GlobalSign
A cloud-based PKI-based cloud IoT Identity Platform allows you to provision, secure, and manage device identities. It is specifically designed for interoperable, flexible, and scalable IoT security. GlobalSign's next generation IoT Identity Platform provides everything you need to manage the entire device identity lifecycle, from design and manufacturing through deployment, management, and sunsetting. Securely provision and manage device identities using a purpose-built, PKI platform. This platform provides exceptional security. Public Key Infrastructure is the credential that IoT and IIoT devices use to identify themselves. A full-featured IoT registration service allows you to simplify, optimize, and harden the process of enrolling, secure, and managing PKI-based IoTdevice identities. It is the key to provisioning unique, strong, and secure device identities. -
46
Nexsign
SAMSUNG SDS
Mobile security that is uniquely yours: Get stronger mobile security Nexsign is the next step in mobile security. Nexsign™, which is not as secure as a password and can be easily forgotten, duplicated or duplicated, verifies your identity using biometric information that includes your fingerprint, voice, and face. The result? The result? An authentication experience that is simpler, faster, and more secure. No more long, complicated passwords! Accessing data can be as easy as recognizing your fingerprints, face, or voice. You can rest assured. Nexsign™, will not store your biometric data on the server. There is no risk of biometric data being leaked because Nexsign™ uses Public-Key Infrastructure (PKI) to authenticate users. Biometric authentication is only the beginning. Nexsign™, which can be used on a variety of platforms and environments such as Mobile OTP and PIN authentication, is also possible. It's now simple and easy to deploy solutions with standard development toolkits, APIs and a web-based admin portal. -
47
ProHoster
$2.50 per month 43 RatingsHosting is a service that allows you to publish information on a server that is always accessible via the Internet. Our servers host the websites and provide the technology necessary to view them on the internet. You will also receive a domain name, DDoS protection and an SSL certificate when you purchase website hosting from us. Unlimited hosting that is reliable and fast with DDOS protection. Also, you get a free domain name, SSL certificate, website builder, and domain. You will need more resources and functionality for projects where regular hosting is not sufficient. Virtualization, such as KVM or OVZ, is possible. This is a great solution for non-standard projects that have higher power requirements and require full root access. Professional DDoS protection against all types of attacks. Rapid response and display of threats. Huge channel handling capacity. -
48
Yandex Certificate Manager
Yandex
You can create or import TLS Certificates and track their validity using the management console. You can update Let'sEncrypt certificates automatically. You only need to confirm domain rights. You can upload certificates from third-party certification authorities and use them on Yandex Cloud. Select certificates from Yandex Certificate Manager and allow HTTPS access to your static sites. When accessing the API, use domains that have been confirmed. In this case, the TLS connection is provided by a certificate that is linked to the domain. All resources are updated at the same time after you upload and update certificates. You can select any type of check when creating a certificate. You only need check the domain rights for Let's Encrypt certificate. Certificate Manager doesn't check domain rights for imported user certificates. -
49
ZeroSSL
ZeroSSL
$8 per monthSecure any site with SSL management that is automated. Supports one-step validation and renewal via RESTAPI. ZeroSSL is the fastest way to issue SSL certificates. You can approve new or existing SSL certificates in just seconds with ZeroSSL. This one-step process includes email validation, server uploads and CNAME verification. ZeroSSL partners with the largest ACME providers to make it easy to manage and renew your certificates. Automate SSL certificate management with ZeroSSL REST API. This includes supporting certificate issuance, CSR validation, as well as other functions. In less than 5 minutes, issue and renew 90-day SSL certificates. Automate with ACME integrations or a fully-featured REST API. -
50
Tencent Cloud supports automatic online CSR generator and can automatically verify domain name ownership hosted by Tencent Cloud DNS and DNSPod. This automates application review and the issuance certificates. The console allows you to upload and manage certificates issued by any CA. It is easy to monitor the validity period of each certificate at a central site. Tencent Cloud supports online CSR generation using private key/passphrase. For data security, the certificate will contain the passphrase. Tencent Cloud resources support the rapid deployment digital certificates via SSL. Certificates can be deployed quickly to CLB or CDN for data security. For added security, data transfer between browsers/apps/servers is encrypted. Symantec root certificates are available for all browsers and mobile devices. HTTPS can improve your website's search ranking and credibility.