Alternatives to Keyfactor EJBCA

Compare Keyfactor EJBCA alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Keyfactor EJBCA in 2025. Compare features, ratings, user reviews, pricing, and more from Keyfactor EJBCA competitors and alternatives in order to make an informed decision for your business.

  • 1
    CLEAR

    CLEAR

    Quantum Knight

    The CLEAR™ Cryptosystem is a FIPS-140-3 Validated programmable state-of-the-art encryption SDK for securing files, streaming video, databases, and networks. Compatible with all types of modern computer platforms, CLEAR™ is an easy to integrate, turn-key tool for boosting existing cybersecurity with Post Quantum (PQC) strength. Apply CLEAR™ Cryptosystem anywhere you want to secure data in your own digital ecosystem. CLEAR™ is a single file with a smaller footprint than a single image on a smart phone. It can be deployed online or offline and works on more than 30 types of modern operating systems and embedded equipment. Designed for maximum efficiency and simplicity, CLEAR can dramatically reduce energy usage at scale, relative to other legacy cryptography.
  • 2
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 3
    GlobalSign

    GlobalSign

    GlobalSign

    GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers and IoT innovators around the world to conduct secure online communications, manage millions of verified digital identities and automate authentication and encryption.
  • 4
    AVX ONE

    AVX ONE

    AppViewX

    AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 5
    Keyfactor Command
    Join the world’s leading enterprises running on the most complete and scalable managed PKI as-a-Service. Get all the advantages of PKI without the complexity. Whether it is securing your network, sensitive data, or connected devices, you turn to PKI as the proven technology to establish trust. But building and running your PKI is a complex and expensive undertaking. Getting it right is critical, but it’s not an easy feat. Finding and retaining the right people with the right skillsets, adherence to industry standards, and the expense of hardware and software required to run a robust PKI are all serious challenges — not to mention all that is at stake when something goes wrong. Easily organize and manage your inventory and set proactive alerts to notify users of expired or non-compliant certificates before they become a headache.
  • 6
    Smallstep Certificate Manager
    Smallstep Certificate Manager is an opinionated, extensible platform for DevSecOps public key infrastructure (PKI). With it, you can easily manage private TLS/SSL certificates for all your internal workloads and developers. Built on step-ca, the leading open-source certificate toolchain, Certificate Manager is available as a managed, linked, or on-premise solution.
  • 7
    Sectigo

    Sectigo

    Sectigo

    Global leader in cybersecurity solutions to secure websites, connected devices, applications, and digital identities. Sectigo is a leading provider of digital identity solutions, including SSL / TLS certificates, DevOps, IoT, and enterprise-grade PKI (Public Key Infrastructure) management, as well as multi-layered web security. As the world's largest commercial Certificate Authority with more than 700,000 customers and over 20 years of experience in online trust, Sectigo partners with organizations of all sizes to deliver automated public and private PKI solutions for securing web servers, user access, connected devices, and applications. Recognized for its award-winning innovation and best-in-class global customer support, Sectigo has the proven performance needed to secure the digital landscape of today and tomorrow. Sectigo is the market leader in SSL / TLS certificates, DevOps, IoT, enterprise-grade PKI (Public Key Infrastructure) management, and multi-layered web security.
  • 8
    Nexus Smart ID Corporate PKI
    Issue, manage and automate PKI certificates for people, services and devices to enable strong authentication, data confidentiality, integrity and digital signatures, with Smart ID Corporate PKI. A corporate public-key infrastructure can issue and manage trusted identities for people, devices and services, forming the basis of information security in an organization. Smart ID provides a reliable foundation, including roles, policies and procedures, for issuing and managing trusted, certificate-based identities. Smart ID corporate PKI is a flexible and scalable solution that can be used by any organization to issue, manage and validate certificate-based digital identities for mixed endpoint environments that include people, infrastructure and things. Based on standard products that are proven in business-critical environments and made in Sweden.
  • 9
    DigiCert ONE
    Fast and flexible, with total control over all your systems and users. It's the modern approach to PKI, and part of DigiCert ONE. The most flexible solution for identifying, validating and securing all your users, systems and devices. DigiCert Enterprise PKI Manager meets you where you are and was built from the ground up to meet even the most stringent regional and local deployment requirements. Options for in-country, air-gapped, private or public cloud, or hybrid. Dynamic, nearly instantaneous ICA creation with advanced permissions and access control. Docker containerization means a light footprint and the ability to scale up or down as your needs change and grow. Automatic orchestration and continuous updates ensure your business-critical applications remain secure and optimized. Overcome the biggest security hurdle facing any IoT initiative: complexity. Easily identify, manage, control and secure every connected device from a single location with DigiCert IoT Device Manager.
  • 10
    HID IdenTrust
    Comprehensive lifecycle management of every certificate in your network for on-premise or cloud-based PKI deployments. Easily migrate from existing certificate authority with policy-based automated issuance, renewal and revocation, eliminating manual processes and related errors. Enterprises increasingly rely on public key infrastructure (PKI) to secure machines, devices, and human access using keys and digital certificates. In partnership with Keyfactor, HID IdenTrust offers a way to simplify PKI and automate certificate lifecycle management at scale. HID IdenTrust delivers cloud-based managed PKI to issue public, private or U.S. Government interoperable (FBCA) digital certificates to secure websites, network and IoT devices, and workforce identities. Discover every certificate across network and cloud environments with real-time inventory of public and private CAs, distributed SSL/TLS discovery tools, and direct integration with key and certificate stores.
  • 11
    StrongKey

    StrongKey

    StrongKey

    StrongKey has been in the PKI business for almost 20 years, with implementations across the globe in a diverse range of applications. StrongKey Tellaro provides a full public key infrastructure (PKI) platform for managing keys and digital certificates. With a built-in hardware security module (HSM) and EJBCA server, customers are able to issue digital certificates with our Tellaro E-Series based on securely generated public keys. Private keys are generated and stored within the HSM. Our PKI management solution integrates with TLS/SSL, identity access management (IAM), digital signature, secrets management, and device management systems. StrongKey Tellaro is a comprehensive software suite that provides strong authentication, encryption, tokenization, PKI management, and digital signature management. Our open-source software includes a FIDO® Certified FIDO2 server, and we support flexible data center and cloud deployment models.
  • 12
    AppViewX CERT+
    The AppViewX CERT+ platform provides users with a full-cycle certificate management suite, enabling 360-degree control and visibility into network infrastructures. It permits the handling of certificate operations such as renewals, revocation, and provisioning from a single interface, and is ingrained with workflow automation, dynamic monitoring, and auditing capabilities. The platform is built for convenience, and drastically reduces the errors, outages, and downtime caused by improper management of PKI. AppViewX software can be deployed in the Linux virtual machines on all AWS elastic compute cloud (EC2), Azure Compute and Google Compute Engine using thesoftware installer. Contact AppViewX team from the Azure and Google Cloud marketplace listings. CERT+ has API integrations with private CA certificate authority services. Certificates can be seamlessly enrolled from these services and used on any devices or applications being managed via CERT+.
  • 13
    KeyScaler

    KeyScaler

    Device Authority

    KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.
  • 14
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 15
    Comodo Certificate Manager
    Advanced Certificate Issuance And Lifecycle Management. Discover and manage all your SSL Digital Certificates automatically. Secure, reliable and centralized management platform. Helps you self-administer, instantly provision and control all SSL/PKI. Expired SSL certificates can cause systems to break, services to go down, and trust in your business to wane. Keeping track of digital certificates and their renewal dates is a big job and it's going to get harder. Need for a mechanism to administer certificates effectively. Flexible and reliable system for digital certificate issuance and lifecycle management. Centralizes and automates management of cryptographic keys and digital certificates. Ensures that certificates do not expire unexpectedly. Secure, tiered cloud-based administration. Microsoft Active Directory integration. Certificate Discovery Tool finds all certificates no matter who issued them. Administrative protection using two-factor authentication and IP address validation.
  • 16
    Secardeo TOPKI
    Digital certificates offer a high degree of security for encryption, strong authentication and digital signatures. In an enterprise PKI you need appropriate services for certificate management and key management. Secardeo TOPKI (Trusted Open PKI) is a PKI system platform for automated key distribution of X.509 certificates and private keys to all users and devices where they are required. For this, TOPKI provides components that serve for specific certificate lifecycle management tasks. The PKI software components of the TOPKI platform can be integrated with other PKI systems, Active Directory or Mobile Device Management systems. TOPKI enables a seamless adoption of managed PKI services. By this you can automatically request certificates from trusted public CAs in the cloud. Or you can use open source CAs, for example to auto-enroll internal computer certificates. The TOPKI PKI products can also enhance your existing Microsoft PKI.
  • 17
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 18
    Keyhub

    Keyhub

    Remme

    Certificate Management on autopilot. Keyhub is a cloud-based platform to automatically discover, organize, and track all SSL/TLS certificates across the enterprise. Get rid of the guesswork. How many digital certificates are in your environment? 71% of organizations don't have an exact answer. You can't protect what you don't see. Real-time automatic discovery. Holistic view of certificates from multiple issuers. Private and public certificates management. Identification of issues and vulnerabilities. Expiration dates tracking and alerting. Corporate policy compliance check. Built on design thinking principles, Keyhub simplifies routine operations, reduces adoption time and streamlines digital transformation. Identify every certificate, known and unknown, with a permanent auto scan of your external and internal environments.
  • 19
    TRUSTZONE

    TRUSTZONE

    TRUSTZONE

    TRUSTZONE is Scandinavia’s largest SSL/TLS certificate supplier and a leading provider of scalable PKI and IoT solutions for encryption, authentication, and automated certificate lifecycle management. With a full suite of compatibility-optimized, fully scalable certificate products and solutions, we offer custom options for companies and organizations across industries. Our options fit all company sizes — from small, one-person businesses and startups needing one or two SSL/TLS certificates to large international companies looking for full-scale, enterprise-grade solutions. We have more than 15 years’ experience with PKI, SSL/TLS, and certificate management. 3,000+ companies of all sizes have already trusted us with their certificates, and more than 80% of the Danish banking sector is protected by TRUSTZONE certificates.
    Starting Price: €299 per user per year
  • 20
    GlobalSign IoT Edge Enroll
    Proper PKI device enrollment is key to provisioning unique, strong and secure devices identities. IoT Edge Enroll is a full-featured, registration authority service that ensures simple, secure and optimized device enrollment. It’s a key component of our PKI-based IoT Identity Platform that enables Device Identity Lifecycle Management. It’s the most comprehensive, flexible, commercial PKI device enrollment feature set available. Certificate Templating Engine for Exacting Enrollment - Leverage custom certificate fields and data to deliver maximum flexibility for unique IoT authentication requirements. Device Identity Manager for Admin Control - Manage unique device identities throughout their lifecycles including certificate auditing and reporting, device whitelist management, device enablement/disablement and enrollment eligibility.
  • 21
    Keyfactor Command for IoT
    Keyfactor Command for IoT is a comprehensive identity management solution designed to secure IoT devices at scale. It automates the issuance, management, and lifecycle of IoT device certificates from manufacturing to end-of-life, ensuring each device remains trusted and secure throughout its lifespan. The platform offers centralized visibility to track and manage device identities, making it easier to maintain compliance, prevent security breaches, and reduce the risk of costly recalls. With features like automated provisioning, revocation, and integration with leading IoT platforms, Keyfactor Command for IoT simplifies device identity management across industries like automotive, healthcare, and manufacturing.
  • 22
    Active Directory Certificate Services (AD CS)
    This document provides an overview of Active Directory Certificate Services (AD CS) in Windows Server® 2012. AD CS is the Server Role that allows you to build a public key infrastructure (PKI) and provide public key cryptography, digital certificates, and digital signature capabilities for your organization. AD CS provides customizable services for issuing and managing digital certificates used in software security systems that employ public key technologies. The digital certificates that AD CS provides can be used to encrypt and digitally sign electronic documents and messages. These digital certificates can be used for authentication of computer, user, or device accounts on a network. You can use AD CS to enhance security by binding the identity of a person, device, or service to a corresponding private key. AD CS gives you a cost-effective, efficient, and secure way to manage the distribution and use of certificates.
  • 23
    Certificate Authority Service
    Certificate Authority Service is a highly available, scalable Google Cloud service that enables you to simplify, automate, and customize the deployment, management, and security of private certificate authorities (CA). Simplify the deployment, management, and security of your enterprise PKI with a cloud service that helps to automate time-consuming, risky, and error-prone infrastructure tasks, freeing you to focus on higher-value projects. Customize Certificate Authority Service to your needs by configuring custom CAs and certificates, enforcing granular access controls, automating common tasks with APIs, and integrating with your existing systems. Have peace of mind knowing that your CA service is highly available, scalable, backed by an SLA, auditable, and ready to help you achieve compliance with advanced hardware and software security controls. Create a private CA in minutes versus the days and weeks that it takes to deploy and operate your own CA.
    Starting Price: $20 per CA per month
  • 24
    Certicom Managed PKI Service
    Digital certificates are a common basis for establishing trust between communicating entities - on the Internet as well as within private networks. They are increasingly important for securing IoT applications employing wireless sensor networks and smart connected devices, with each endpoint representing a new attack surface. That growing attack surface is critical to consider when designing your security architecture. Managing an organization’s certificates with an in-house Public Key Infrastructure (PKI) is usually a time consuming and expensive endeavor. Certicom makes it easy, offering a secure and reliable hosted PKI platform which can manage certificates on behalf of an organization or an entire ecosystem. The service minimizes the up-front expense and lowers the ongoing cost of managing certificates while helping customers secure their devices and get their products to market quickly.
  • 25
    ManageEngine Key Manager Plus
    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Similarly, managing a Secure Socket Layer (SSL) environment can be daunting when organizations use a large number of SSL certificates issued by different vendors with varying validity periods. On the other hand, SSL certificates left unmonitored and unmanaged could expire, or rogue/invalid certificates could be used. Both scenarios could lead to service downtime or display of error messages that would destroy customer trust in data security and, in extreme cases, even result in security breaches.
    Starting Price: $595 per year
  • 26
    GlobalSign IoT Identity
    Provision, secure and manage device identities with a PKI-based cloud IoT Identity Platform, purpose built for scalable, flexible and interoperable IoT security. GlobalSign’s next-generation IoT Identity Platform delivers everything you need for full device identity lifecycle management from design and manufacturing, through deployment, management and sunsetting. Provision and secure device identities with a purpose-built, PKI-based platform for exceptional security. Public Key Infrastructure is the de facto credential for IoT and IIoT device identity. Simplify, optimize and harden how you enroll, secure and manage PKI-based, IoTdevice identities with a full-featured IoT registration authority service that ensures secure, customizable device enrollment. It’s the key to provisioning unique, strong and secure device identities.
  • 27
    KeyTalk

    KeyTalk

    KeyTalk

    KeyTalk is independent of Certificate Authorities and linked to a large number of public CAs both GMO GlobalSign and Digicert QuoVadis. Switching between CAs is simple and easy, even when thousands of certificates and end-points are involved. A vendor lock-in is therefore no longer the case. KeyTalk contains an internal CA for the generation of private certificates and keys. Did you use previously expensive public certificates for internal purposes? Or did you run into the limited functionality of Microsoft CS and other private CAs? Then, you will like our internal CA, private PKI certificate issuance. KeyTalk keeps track of the lifecycle of your certificates in a fully automated way. This way, you always have a complete and up to date overview of all your certificates, including the certificate name, SAN and validity. Also, things like used crypto keys and algorithms of internal and external certificates can be included.
  • 28
    Dogtag

    Dogtag

    Dogtag

    The Dogtag Certificate System is an enterprise-class open source Certificate Authority (CA). It is a full-featured system, and has been hardened by real-world deployments. It supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management, and much more. The Dogtag Certificate System can be downloaded for free and set up in less than an hour. Dogtag is a collection of technologies that allow enterprises to deploy PKI on a large scale. Certificate issuance, revocation, and retrieval. Certificate Revocation List (CRL) generation and publishing. Certificate Profiles. Simple Certificate Enrollment Protocol (SCEP). Local Registration Authority (LRA) for organizational authentication and policies. Encryption key archival and recovery. Smartcard lifecycle management. Token profiles, token enrollment, on-hold, key recovery, and format. Face-to-face enrollment with the security officer workstation interface.
  • 29
    emCA

    emCA

    eMudhra

    Server Certs, IP Certs, User Certs, Device Certs, you name it, we have it as part of our Certificate Engine. What's more, just connect to eMudhra's CertiNext and get a fully automated certificate management up and running with ease. With a 3 click process to almost any activity, user-friendly interface & strong configuration capabilities, the intuitiveness of emCA Certificate Engine is unparalleled in the industry. From setting up hierarchies, to managing cert profiles and admin settings, it's a do-it-yourself PKI platform for non-PKI people. emCA works with a number of HSM's, Databases, & Operating Systems. It allows you to leverage your cloud, hybrid, or on-prem infrastructure to optimize your cost, manage your internal compliance and security requirements, and evolves with your organization's security and cloud posture.
  • 30
    AWS Certificate Manager
    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources. SSL/TLS certificates are used to secure network communications and establish the identity of websites over the Internet as well as resources on private networks. AWS Certificate Manager removes the time-consuming manual process of purchasing, uploading, and renewing SSL/TLS certificates. SSL, and its successor TLS, are industry standard protocols for encrypting network communications and establishing the identity of websites over the Internet. SSL/TLS provides encryption for sensitive data in transit and authentication using SSL/TLS certificates to establish the identity of your site and secure connections between browsers and applications and your site.
  • 31
    DigiCert CertCentral
    CertCentral simplifies the entire lifecycle by consolidating tasks for issuing, installing, inspecting, remediating, and renewing certificates. Every part of the cycle on one pane of glass. With ACME + CertCentral, you can automate deployment using virtually any client and any server type, any way you prefer. That means less time spent completing tedious manual tasks—or worse, putting out fires. With DigiCert, you use ACME protocol to automate deployment of OV and EV certificates with custom validity periods. The benefits just keep adding up. To enable ACME in CertCentral, simply contact your sales rep. You used to run into two bottlenecks with certificates: approval and renewal. Now, automating these tasks—and more—is as easy as a few clicks. If this were a race, you’d be winning. Receive alerts about potential vulnerabilities and know when each cert is about to expire. Because guessing is just gambling.
  • 32
    Accops HyID

    Accops HyID

    Accops Systems

    Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 33
    Acmetek

    Acmetek

    Acmetek

    Acmetek is a DigiCert website security solutions authorized distributor and a platinum partner. We offer all 4 brands of SSL certificates DigiCert, Thawte, GeoTrust, and RapidSSL. Our trusted seals bring customer confidence that increases online sales and enhances your business growth. Acmetek started its journey into Website Security Solutions mainly focusing on SSL in 2010 as a result of a simple observation: SSL has evolved over the years, but technology, distributors, and businesses have not adopted yet. This mismatch led the founders of Acmetek to create the vision for the SSL experience and to develop channel enablement model to support it. With our powerful enablement model, businesses can implement SSL with ease. Our integrated set of tools and enablement support helps partners to offer SSL and implement for their clients across the globe. Our sole mission is to make the world more secure, transforming one business after another.
  • 34
    Unbound CORE Identity Security
    Authenticate users and machines and protect PKI – seamlessly across all locations and devices. Create virtual enclaves for mobile and for desktop with maximum security and without sacrificing the user experience. Authenticate user access and identify simply and securely with CORE virtual secure enclave SDK. Mobile, desktop, or server-side enabled – CORE keeps credentials safe even if the user’s personal device is compromised. Build virtual smartcards, protect mobile apps, and more with pure software agility. Integrate strong two-factor and multi-factor authentication into a mobile app – no hardware, no one-time password, no software token required. Replace traditional smartcards with virtual ones to authenticate employees and reduce operational strain and total cost of ownership. Protect machine and human electronic identities and the root certificate authority which oversees them. Protecting PII with maximum security, best user experience.
  • 35
    CyberArk Machine Identity Security
    CyberArk Machine Identity Security provides comprehensive protection for all machine identities, including secrets, certificates, workload identities, and SSH keys. The platform offers centralized visibility and scalable automation to secure these non-human identities throughout their lifecycle. Designed to help organizations reduce risk and maintain resilience, CyberArk ensures secure machine identity management across on-premises, cloud, and hybrid environments.
  • 36
    Entrust Cryptographic Security Platform
    The Entrust Cryptographic Security Platform is a unified, end-to-end solution designed to manage cryptographic assets, including keys, secrets, and certificates, across diverse enterprise environments. It offers centralized visibility through a unified dashboard, enabling organizations to monitor cryptographic assets, audit changes, and receive alerts for enhanced security oversight. It supports scalable deployment with high-performance cryptographic solutions, ensuring compliance with regulatory standards and providing future-proof protection against emerging threats. Features include automated certificate lifecycle management, robust key and secrets management, and integration with hardware security modules for secure key storage and cryptographic operations. Additionally, the platform facilitates interoperability with existing IT and security infrastructures through extensive integrations and open APIs.
  • 37
    Xage

    Xage

    Xage Security

    Xage Security is a cybersecurity company that provides zero trust asset protection for critical infrastructure, industrial IoT, and operational technology (OT) environments. Xage's Fabric Platform underpins all of its products and use cases, defending assets against attacks across OT, IIoT, IT, and the cloud. Xage's zero trust approach to security is based on the principle of "never trust, always verify." This means that Xage authenticates all users and devices before granting access to any assets. Xage also enforces granular access policies based on user identity, context, and asset risk. Xage's products include: Zero Trust Remote Access Identity-Based Access Management Zero Trust Data Exchange Xage's products are used by a wide range of organizations, including government agencies, utilities, and industrial manufacturers. Xage's customers rely on Xage to protect their critical infrastructure, OT assets, and industrial data from cyberattacks.
  • 38
    CertHat

    CertHat

    ProMDM

    Business downtime or system outage related to invalid or expired digital certificates. During a 30 day free trial period, you will be able to evaluate CertHat Tools for Microsoft Active Directory Certificate Services (AD CS) and make an informed decision about a potential purchase. During a 30 day free trial period, you will be able to evaluate CertHat Tools for Microsoft Active Directory Certificate Services (AD CS) and make an informed decision about a potential purchase. In case you decide to purchase a full CertHat license you will be able to convert your Trial installation into a production instance simply by entering a valid license key into the product. Free basic version of CertHat Tools for Microsoft PKI. CertHat Essentials is a tool that can assist PKI managers in their key tasks of monitoring and managing certificates. With CertHat Essentials, you can use core CertHat functionalities.
  • 39
    DigiCert IoT Device Manager
    Easily identify, manage, control and secure every connected device from a single location, no matter where they're at in the lifecycle. Every day, people are inventing new ways to connect devices. The most recent estimates predict as many as 75 billion will be online by 2025. Securing so many devices, each with its unique manufacturing process, electronics, software, function and lifecycle, requires a uniquely flexible, scalable and trusted solution. Built to evolve with the growing landscape of IoT, DigiCert IoT Device Manager makes it simple to manage all your devices, regardless of how they’re built, what they do or how many you send out into the world. DigiCert IoT Device Manager takes advantage of modern PKI to meet the needs of even the most demanding IoT deployments. From silicon injection to sunsetting, manufacturing floor to the field, or single remediation to the nearly simultaneous issuance of millions of certificates, IoT Device Manager is the simple and scalable solution.
  • 40
    Cellframe

    Cellframe

    Cellframe

    Cellframe Network is a scalable open-source next generation platform for building and bridging blockchains and services secured by post-quantum encryption. We offer a stage for enterprises and developers for building a vast array of products ranging from simple low-level t-dApps to whole other blockchains on top of Cellframe Network. We believe that the next paradigm for blockchain technology is mass adoption and our platform strives to expand the use cases associated with blockchain technology. Cellframe can provide extremely high transaction throughput based on the original sharding implementation. In addition, Post-quantum cryptography makes the system resistant to hacking by quantum computers, which are not far off. Based on the original sharding implementation, Cellframe can provide extremely high transaction throughput.
  • 41
    Ericsson NetCloud Service
    Ericsson NetCloud Service is a comprehensive subscription-based solution that delivers cloud management, customer support, lifecycle warranty, training, and purpose-built routers for 5G and LTE wireless networks. It enables businesses to maximize the value of cellular networking with real-time software updates and secure, scalable connectivity for Wireless WAN and private cellular deployments. The platform offers 24/7 global enterprise-level support and warranty coverage during the subscription term. Users benefit from on-demand training and certification programs to keep up with the latest technologies and products. NetCloud Service supports various use cases including branch offices, mobile vehicles, IoT, private networks, and small sites, providing tailored features like SD-WAN, zero trust security, AI virtual assistants, and advanced network analytics. Ericsson continuously updates its endpoints and cloud software to ensure network reliability, security, and performance.
  • 42
    Entrust IoT Agent
    Ensure a trusted Internet of Things by establishing a secure, connected ecosystem – from device manufacturing through the entire IoT lifecycle – with our IoT Security Solutions. The Internet of Things has the ability to transform business and create value, but only if the IoT ecosystem is secure. With IoT Agent from Entrust, you can leverage high-assurance IoT security to drive innovation. Our IoT Security Solutions software platform assigns unique digital identities to connected “things” using enterprise-grade cryptography to build an end-to-end chain of trust in IoT environments across industries. We offer secure, remote, on-demand upgrades and updates that enable you to take advantage of new capabilities, comply with changing security requirements, and maximize your IoT investments. Leverage the provisioning of identities to facilitate fast enrollment of devices in the supply chain ecosystem.
  • 43
    Corsha

    Corsha

    Corsha

    APIs power all of your applications and services. Secrets are shared. They are rarely rotated, sometimes never at all. API keys and tokens, even PKI, are getting leaked at an alarming rate. You need clear visibility into and simple control over the machines that are accessing your APIs. Organizations lack visibility into the machines that are leveraging API secrets, and as automation shifts risk from human to machine, the identities of these machines and the secrets they use is more important than ever. Corsha stops API attacks that use stolen or compromised API credentials and helps enterprises protect data and applications that leverage machine to machine (or service to service) API communication.
  • 44
    CertiNext

    CertiNext

    eMudhra

    A Certificate Lifecycle Management (CLM) with built-in Key Management. Generate and Rotate Keys Seamlessly. Encrypt & Decrypt Data Securely. CertiNext supports all AES, RSA and ECDSA keys for your key management needs to ensure that your keys, and hence, your data remains protected, always. CertiNext Key Management comes with KMIP support to help you automate key management straight from CertiNext and ensure your ecosystem is always secure. Manage your key rotation policies straight from the dashboard. Lost your keys? No problem, you can easily recover and/or reissue your lost keys CertiNext is flexible to allow you to store your keys in encrypted form within your App Server or alternately, store in secure hardware. You can even manage how keys get distributed to address your business requirements from the dashboard.
  • 45
    Akeyless Vault
    Akeyless is a cloud-native SaaS platform that secures the entire lifecycle of machine identities, credentials, certificates, and keys, eliminating complex and burdensome vault management, resulting in up to a 70% reduction in costs. The platform uses Distributed Fragments Cryptology (DFC™) to ensure zero knowledge—secrets are created as distributed fragments in the cloud and never found in one place. Akeyless is fast to deploy, requires no maintenance, is built for automation, and offers infinite scaling capabilities regardless of the number of environments, regions, or clouds, leading to a 270% higher adoption rate compared to vaults. Akeyless also strengthens AI pipelines from end to end by centralizing authentication, secrets management, certificate automation, and policy enforcement so AI agents can work securely and efficiently without relying on embedded credentials.
  • 46
    EncryptSSL

    EncryptSSL

    EncryptSSL

    EncryptSSL is an online platform that provides free SSL/TLS certificate generation and management for websites of any size. The service enables users to secure their domains with HTTPS encryption quickly and without cost, helping to protect data transmission and improve trust with visitors. Built around the open infrastructure of Let’s Encrypt, EncryptSSL acts as a simplified interface that automates the process of creating, validating, and renewing SSL certificates. Through an intuitive, browser-based workflow, users can generate certificates by verifying domain ownership via DNS, HTTP file upload, or email validation. Once verified, the platform issues a valid SSL certificate that can be downloaded and installed on most web servers and hosting environments.
  • 47
    Wind River Helix Virtualization Platform
    Wind River® Helix™ Virtualization Platform consolidates multi-OS and mixed-criticality applications onto a single edge compute software platform, simplifying, securing, and future-proofing critical infrastructure solutions in the aerospace, defense, industrial, medical, and automotive markets. The demand for more intelligence at the edge while supporting legacy applications requires industries to adapt quickly to modern software and cloud deployment practices while maintaining dedicated, long-standing software. To meet these challenges, Helix Platform allows legacy software to remain unchanged while running alongside new applications, and it provides all the benefits of a consistent, scalable, and agile platform across a wide range of edge devices. Highly regulated applications requiring robust time and space partitioning. Combining multiple workloads without certification requirements.
  • 48
    QSE

    QSE

    QSE Group

    QSE Group delivers quantum-resilient cybersecurity solutions designed to protect sensitive data from both current and future threats, including quantum computing. Using post-quantum cryptographic algorithms aligned with NIST standards, QSE secures data through encryption, key management, and secure communications. Built with an API-first design, it integrates easily into existing cloud, on-prem, or hybrid environments. Core features include secure entropy generation, zero trust policy enforcement, and compatibility with identity systems and SIEM tools. QSE also supports white-label deployment for SaaS vendors and MSPs. With real-time monitoring, compliance-ready reporting, and applications across finance, healthcare, legal, and government sectors, QSE enables future-proof protection without disrupting current infrastructure. It's a practical, scalable solution for organizations serious about long-term data security.
    Starting Price: $19.90/month
  • 49
    Check Point Quantum Network Security

    Check Point Quantum Network Security

    Check Point Software Technologies

    Cyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT and remote users. Check Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN and IOT security to protect you against the most sophisticated cyber attacks. Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Integrating the most advanced threat prevention and a consolidated management, our security gateway appliances are designed to prevent any cyber attack, reduce complexity and lower your costs.
  • 50
    GoGetSSL

    GoGetSSL

    GoGetSSL

    GOGETSSL™ is a well-known and trusted brand on the market with more than 81,500 customers from 223+ countries. We sell digital certificates from leading certificate authorities for more than 10 years. Our store is a great place to find the cheapest SSL certificates to protect any website, application and online transactions. Our certificates issued by leading providers like Sectigo, RapidSSL, Thawte, DigiCert, and GeoTrust. We have domain validated, organization validation, extended validation, wildcard SSL certificates and of course multiple domains certificates available. Every certificate comes with the green lock in the address bar and website ranking improvement in Google Search engine. With EV certificates you get even more instant trust via green address bar with your verified company name. SSL protocol is one the most powerful way to protect your traffic against hackers and criminals. Remember, losing sensitive data of your customers means their losing trust!