Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

KeyScaler® serves as a specialized identity and access management platform, designed specifically for IoT and Blockchain applications. It enables users to securely onboard, provision, and link devices to various IoT platforms, applications, and services. The platform streamlines the creation of a comprehensive security framework within the IoT ecosystem, enhancing operational efficiency through automation and eliminating the need for human oversight. Given the vast and constantly evolving nature of IoT, where new devices are incessantly added, managing this process without automation quickly becomes overwhelming. There is a pressing need for a device identification strategy that focuses on individual devices, ensuring they are authenticated in an automatic and dynamic manner without any manual input. Device Authority has introduced a versatile device interface protocol that works in tandem with KeyScaler® to facilitate automated public key infrastructure (PKI) for IoT devices, offering two distinct options for device authentication and enhancing overall security measures. This innovation not only supports scalability but also addresses the critical need for secure device management in modern IoT environments.

Description

We are convinced that organizations merit a comprehensive solution for managing their encryption keys. SvKMS offers a unified platform that facilitates the management of all encryption keys, regardless of location. Clients can access an enterprise-level key management system suitable for various encryption workflows, whether they operate at the edge, within a data center, in the cloud, or across multiple clouds. With its enterprise-grade functionalities, SvKMS presents a user-friendly interface at an unexpectedly affordable price. It can be deployed anywhere, ensuring high availability without limitations, and supports integration with any operational workflow. The advanced key management capabilities, coupled with robust reporting and authorization features, come at the most competitive price for extensive scaling. Centralized oversight, straightforward configuration, and seamless administration are at the core of the system. By consolidating all encryption key management activities into a unified virtual appliance, SvKMS enhances risk mitigation through a graphical user interface, incorporates REST API-driven workflows, and adheres to KMIP standards, enabling swift customization, comprehensive logging, and effective dashboard auditing and monitoring for various deployment scenarios. This holistic approach ensures that enterprises can efficiently manage their encryption needs while minimizing risks and maximizing operational efficiency.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Cisco Secure Cloud Analytics
Cognizant
CyberArk Machine Identity Security
Datacard Secura
Dell EMC NetWorker
DevicePilot
Entrust Certificate Hub
Google Cloud Platform
HP-UX
IBM Db2
Lenovo ThinkAgile HX Series
Microsoft Azure
Microsoft Hyper-V
Nutanix AOS Storage
Symantec Endpoint Protection
VMware vSphere

Integrations

Amazon Web Services (AWS)
Cisco Secure Cloud Analytics
Cognizant
CyberArk Machine Identity Security
Datacard Secura
Dell EMC NetWorker
DevicePilot
Entrust Certificate Hub
Google Cloud Platform
HP-UX
IBM Db2
Lenovo ThinkAgile HX Series
Microsoft Azure
Microsoft Hyper-V
Nutanix AOS Storage
Symantec Endpoint Protection
VMware vSphere

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Device Authority

Founded

2014

Country

United Kingdom

Website

www.deviceauthority.com/solutions/keyscaler-identities/

Vendor Details

Company Name

StorMagic

Founded

2006

Country

United Kingdom

Website

stormagic.com/encryption-key-management/

Product Features

Alternatives

Keyfactor EJBCA Reviews

Keyfactor EJBCA

Keyfactor

Alternatives

ARIA KMS Reviews

ARIA KMS

ARIA Cybersecurity Solutions
EncryptRIGHT Reviews

EncryptRIGHT

Prime Factors