Introducing G2.ai, the future of software buying.Try now

Top Free Encryption Key Management Software

Check out our list of free Encryption Key Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Encryption Key Management Software to ensure you get the right product.

View Free Encryption Key Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
16 Encryption Key Management Products Available
(1,099)4.4 out of 5
Optimized for quick response
2nd Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

    Users
    • Project Manager
    • President
    Industries
    • Construction
    • Marketing and Advertising
    Market Segment
    • 44% Small-Business
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Egnyte features and usability ratings that predict user satisfaction
    9.0
    Regional Support
    Average: 8.6
    9.0
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JH
    Our engineering firm shopped around for live file storage solutions that suited our needs, and were disappointed to find that either they didn't... Read review
    Monica Y.
    MY
    Egnyte makes it easy to securely store, access, and share files. The platform is user-friendly, integrates well with other tools, and the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Egnyte
    Company Website
    Year Founded
    2008
    HQ Location
    Mountain View, CA
    Twitter
    @Egnyte
    16,257 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,188 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

Users
  • Project Manager
  • President
Industries
  • Construction
  • Marketing and Advertising
Market Segment
  • 44% Small-Business
  • 39% Mid-Market
Egnyte features and usability ratings that predict user satisfaction
9.0
Regional Support
Average: 8.6
9.0
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.7
JH
Our engineering firm shopped around for live file storage solutions that suited our needs, and were disappointed to find that either they didn't... Read review
Monica Y.
MY
Egnyte makes it easy to securely store, access, and share files. The platform is user-friendly, integrates well with other tools, and the... Read review
Seller Details
Seller
Egnyte
Company Website
Year Founded
2008
HQ Location
Mountain View, CA
Twitter
@Egnyte
16,257 Twitter followers
LinkedIn® Page
www.linkedin.com
1,188 employees on LinkedIn®
(82)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 28% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akeyless Identity Security Platform features and usability ratings that predict user satisfaction
    9.4
    Regional Support
    Average: 8.6
    9.4
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    9.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joseph B.
    JB
    Their pricing system is great. While I'm now on the business plan, I was initially on the free "starter" plan which was a great way of making sure... Read review
    US
    Seamless connection to Stack. It really helps in reducing the communication time between multiple teams. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akeyless
    Company Website
    Year Founded
    2018
    HQ Location
    Ramat Gan, Israel
    Twitter
    @akeylessio
    276 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    102 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 28% Mid-Market
Akeyless Identity Security Platform features and usability ratings that predict user satisfaction
9.4
Regional Support
Average: 8.6
9.4
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
9.0
Ease of Use
Average: 8.7
Joseph B.
JB
Their pricing system is great. While I'm now on the business plan, I was initially on the free "starter" plan which was a great way of making sure... Read review
US
Seamless connection to Stack. It really helps in reducing the communication time between multiple teams. Read review
Seller Details
Seller
Akeyless
Company Website
Year Founded
2018
HQ Location
Ramat Gan, Israel
Twitter
@akeylessio
276 Twitter followers
LinkedIn® Page
www.linkedin.com
102 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(46)4.3 out of 5
9th Easiest To Use in Encryption Key Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    8.8
    Regional Support
    Average: 8.6
    8.7
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    7.7
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Fernando B.
    FB
    Vault is super flexible, and helps you implement from simple secrets management to dynamic credentials and a series of other operations with data... Read review
    Verified User in Automotive
    AA
    Secret as a Service (Dynamic secrets) and flexibility. Good integration with multiple authentication provider. Good varities on Dynamic secrets... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    100,553 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,343 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
HashiCorp Vault features and usability ratings that predict user satisfaction
8.8
Regional Support
Average: 8.6
8.7
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
7.7
Ease of Use
Average: 8.7
Fernando B.
FB
Vault is super flexible, and helps you implement from simple secrets management to dynamic credentials and a series of other operations with data... Read review
Verified User in Automotive
AA
Secret as a Service (Dynamic secrets) and flexibility. Good integration with multiple authentication provider. Good varities on Dynamic secrets... Read review
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
100,553 Twitter followers
LinkedIn® Page
www.linkedin.com
2,343 employees on LinkedIn®
Ownership
NASDAQ: HCP
(61)4.8 out of 5
1st Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 80% Small-Business
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    7.6
    Regional Support
    Average: 8.6
    9.6
    Scalability
    Average: 8.7
    9.4
    API/Integrations
    Average: 8.5
    9.6
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ibukun D.
    ID
    I am able to create multiple configs and integrate with several platforms with auto sync. Read review
    Verified User in Marketing and Advertising
    UM
    That my team doesn't need to store sensitive data on their local machines anymore. I also really like the access logs, giving insight into who does... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 80% Small-Business
  • 18% Mid-Market
Doppler secrets management platform features and usability ratings that predict user satisfaction
7.6
Regional Support
Average: 8.6
9.6
Scalability
Average: 8.7
9.4
API/Integrations
Average: 8.5
9.6
Ease of Use
Average: 8.7
Ibukun D.
ID
I am able to create multiple configs and integrate with several platforms with auto sync. Read review
Verified User in Marketing and Advertising
UM
That my team doesn't need to store sensitive data on their local machines anymore. I also really like the access logs, giving insight into who does... Read review
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,454 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
(77)4.5 out of 5
10th Easiest To Use in Encryption Key Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 82% Enterprise
    • 13% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command features and usability ratings that predict user satisfaction
    8.1
    Regional Support
    Average: 8.6
    8.7
    Scalability
    Average: 8.7
    8.8
    API/Integrations
    Average: 8.5
    8.2
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Insurance
    AI
    The company is great to work with, their product is changing based on customer feedback. Tech Support is also wonderful Read review
    Verified User in Information Technology and Services
    AI
    Flexible, user friendly Ui and stable. Each version release continues to improve on the previous version. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Company Website
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,778 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    468 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Command is a certificate lifecycle management solution that enables organizations to discover, control, and automate the lifecycle of keys and digital certificates across their IT landscape.

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 82% Enterprise
  • 13% Mid-Market
Keyfactor Command features and usability ratings that predict user satisfaction
8.1
Regional Support
Average: 8.6
8.7
Scalability
Average: 8.7
8.8
API/Integrations
Average: 8.5
8.2
Ease of Use
Average: 8.7
Verified User in Insurance
AI
The company is great to work with, their product is changing based on customer feedback. Tech Support is also wonderful Read review
Verified User in Information Technology and Services
AI
Flexible, user friendly Ui and stable. Each version release continues to improve on the previous version. Read review
Seller Details
Seller
Keyfactor
Company Website
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,778 Twitter followers
LinkedIn® Page
www.linkedin.com
468 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales Data Protection on Demand features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NA
    The authentication integration with the mobile device (Mobilepass +) is very good and connects to seamlessly. The web portal offers a lot of... Read review
    Nishant A.
    NA
    It is not just data protection, it is data protection on demand! The Hardware Security Module has proven to be a great innovation for us to set up... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,879 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,279 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

The protection you need when you need it, with Data Protection on Demand. Thales’ Data Protection on Demand empowers organizations with a high level of security, efficiency, and flexibility, all wi

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Thales Data Protection on Demand features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.7
NA
The authentication integration with the mobile device (Mobilepass +) is very good and connects to seamlessly. The web portal offers a lot of... Read review
Nishant A.
NA
It is not just data protection, it is data protection on demand! The Hardware Security Module has proven to be a great innovation for us to set up... Read review
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,879 Twitter followers
LinkedIn® Page
www.linkedin.com
1,279 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ubiq Encryption Platform features and usability ratings that predict user satisfaction
    10.0
    Regional Support
    Average: 8.6
    10.0
    Scalability
    Average: 8.7
    10.0
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Management Consulting
    EM
    It works with unstructured and structured data, supports format preservation, and full and partial data masking. It is 100% cloud-based with fully... Read review
    Verified User in Computer & Network Security
    UC
    It has SDKs and REST APIs. Very easy to interface programmatically. Supports auto-detection of encrypted vs plain-text data via SDK calls. Very... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    San Diego, US
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users w

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Enterprise
Ubiq Encryption Platform features and usability ratings that predict user satisfaction
10.0
Regional Support
Average: 8.6
10.0
Scalability
Average: 8.7
10.0
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.7
Verified User in Management Consulting
EM
It works with unstructured and structured data, supports format preservation, and full and partial data masking. It is 100% cloud-based with fully... Read review
Verified User in Computer & Network Security
UC
It has SDKs and REST APIs. Very easy to interface programmatically. Supports auto-detection of encrypted vs plain-text data via SDK calls. Very... Read review
Seller Details
Year Founded
2013
HQ Location
San Diego, US
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    6.7
    Scalability
    Average: 8.7
    3.3
    API/Integrations
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Hospitality
    AH
    Very easy to get started, good help through links, good overview, easy to navigate. Impressed by the support! Supports profiles for Samsung... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,869 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    550 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure So

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
ManageEngine Key Manager Plus features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
6.7
Scalability
Average: 8.7
3.3
API/Integrations
Average: 8.5
10.0
Ease of Use
Average: 8.7
Verified User in Hospitality
AH
Very easy to get started, good help through links, good overview, easy to navigate. Impressed by the support! Supports profiles for Samsung... Read review
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,869 Twitter followers
LinkedIn® Page
www.linkedin.com
550 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EncryptRIGHT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AS
    I like to protect information data and application code within the local server and public cloud, password protection, and access. Different... Read review
    RS
    Safety in the hands and activity control of all applications managed by the software, customization of structures and completion. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1981
    HQ Location
    Eugene, Oregon, United States
    Twitter
    @Prime_Factors
    218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access control

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
EncryptRIGHT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.2
Ease of Use
Average: 8.7
AS
I like to protect information data and application code within the local server and public cloud, password protection, and access. Different... Read review
RS
Safety in the hands and activity control of all applications managed by the software, customization of structures and completion. Read review
Seller Details
Year Founded
1981
HQ Location
Eugene, Oregon, United States
Twitter
@Prime_Factors
218 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command for IoT features and usability ratings that predict user satisfaction
    8.3
    Regional Support
    Average: 8.6
    8.3
    Scalability
    Average: 8.7
    8.3
    API/Integrations
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Arup Kumar P.
    AP
    The edge devices that the customers use are often on the verge of the potential risk of security breaches because they are either not regularly... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,778 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    468 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Keyfactor Command for IoT features and usability ratings that predict user satisfaction
8.3
Regional Support
Average: 8.6
8.3
Scalability
Average: 8.7
8.3
API/Integrations
Average: 8.5
9.2
Ease of Use
Average: 8.7
Arup Kumar P.
AP
The edge devices that the customers use are often on the verge of the potential risk of security breaches because they are either not regularly... Read review
Seller Details
Seller
Keyfactor
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,778 Twitter followers
LinkedIn® Page
www.linkedin.com
468 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortanix features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RR
    I found it interesting that Fortanix has a data-centric approach. This flexibility helps to rationalise the management of security operations and... Read review
    MM
    Fortanix has separated encryption keys from hardware, it has provided me with something that the traditional key management solutions do not have –... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortanix
    Year Founded
    2016
    HQ Location
    Santa Clara, US
    Twitter
    @fortanix
    1,014 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With Fortanix, organizations gain the freedom to accelerate their digital transformation, combine and analyze private data, and deliver secure applications that protect the privacy of the people they

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 50% Small-Business
Fortanix features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.7
RR
I found it interesting that Fortanix has a data-centric approach. This flexibility helps to rationalise the management of security operations and... Read review
MM
Fortanix has separated encryption keys from hardware, it has provided me with something that the traditional key management solutions do not have –... Read review
Seller Details
Seller
Fortanix
Year Founded
2016
HQ Location
Santa Clara, US
Twitter
@fortanix
1,014 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Boulder, US
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Data Control Platform by IronCore Labs gives developers tools to control access to data with encryption to build minimal trust, zero-trust, and end-to-end encryption applications. Make the world

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IronCore Labs Data Control Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Boulder, US
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Join 5000+ business and Government entities that already use Jellyfish for critical functions, such as increasing security and streamlining business processes around authentication and digital signing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Jellyfish by Cogito Group features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • BJ
    Its a one stop platform that allows you to manage on premise, cloud and mobile devices and access. It gives great visibility and all at a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Barton, AU
    Twitter
    @CogitoGroup1
    255 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Join 5000+ business and Government entities that already use Jellyfish for critical functions, such as increasing security and streamlining business processes around authentication and digital signing

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Jellyfish by Cogito Group features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.7
BJ
Its a one stop platform that allows you to manage on premise, cloud and mobile devices and access. It gives great visibility and all at a... Read review
Seller Details
Year Founded
2011
HQ Location
Barton, AU
Twitter
@CogitoGroup1
255 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SSL Certificate Lifecycle Management empowers enterprises of all sizes to Govern and orchestrate SSL/TLS certificates from simple and centralized place. Key Features are : - Centralized inventory to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • QCecuring SSL Certificate Lifecycle Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • MM
    I have 6 subdomains and we utilize public CA for getting certificates, I have Microsoft PKI that I utilize to issue private certificates for our... Read review
    Verified User in Automotive
    UA
    Keyfactor, venafi, sectigo, appviewx do not provide Free version of CLM, But cecuring is providing 30 certificates management for free. If you have... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SSL Certificate Lifecycle Management empowers enterprises of all sizes to Govern and orchestrate SSL/TLS certificates from simple and centralized place. Key Features are : - Centralized inventory to

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
QCecuring SSL Certificate Lifecycle Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Use
Average: 8.7
MM
I have 6 subdomains and we utilize public CA for getting certificates, I have Microsoft PKI that I utilize to issue private certificates for our... Read review
Verified User in Automotive
UA
Keyfactor, venafi, sectigo, appviewx do not provide Free version of CLM, But cecuring is providing 30 certificates management for free. If you have... Read review
Seller Details
Year Founded
2023
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sepior provides advanced cryptographic key management and protection software, libraries, SDKs and toolsets. Our customers are typically platform developers, service providers, product providers, or l

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sepior features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sepior
    Year Founded
    2017
    HQ Location
    Remote First, US
    LinkedIn® Page
    www.linkedin.com
    208 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sepior provides advanced cryptographic key management and protection software, libraries, SDKs and toolsets. Our customers are typically platform developers, service providers, product providers, or l

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sepior features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sepior
Year Founded
2017
HQ Location
Remote First, US
LinkedIn® Page
www.linkedin.com
208 employees on LinkedIn®