Introducing G2.ai, the future of software buying.Try now
BEON.tech
Sponsored
BEON.tech
Visit Website
Product Avatar Image
Keyfactor Command for IoT

By Keyfactor

4.8 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Keyfactor Command for IoT?

BEON.tech
Sponsored
BEON.tech
Visit Website
It's been two months since this profile received a new review
Leave a Review

Keyfactor Command for IoT Reviews & Product Details

Profile Status

This profile is currently managed by Keyfactor Command for IoT but has limited features.

Are you part of the Keyfactor Command for IoT team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Keyfactor Command for IoT before?

Answer a few questions to help the Keyfactor Command for IoT community

Keyfactor Command for IoT Reviews (2)

Reviews

Keyfactor Command for IoT Reviews (2)

4.8
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Arup Kumar P.
AP
Software Engineer II
Enterprise (> 1000 emp.)
"Secure your IOT devices with this software"
What do you like best about Keyfactor Command for IoT?

The edge devices that the customers use are often on the verge of the potential risk of security breaches because they are either not regularly updated with the latest software or the state-of-the-art software updates have not been installed. Often data breaches occur from these edge devices or thin clients. Albeit the processing of data is done in a central system with the required amount of security, the IoT devices are the spikes for collecting data and a security breach at that point may prove to be very costly. To prevent that we decided to try out a specific security software curated for our needs and this software provides the advantages and facilities at an effective price. Review collected by and hosted on G2.com.

What do you dislike about Keyfactor Command for IoT?

Generally, security solutions are like wine, the more it ages and stands the test of time, the more reliable it becomes. This software is new in the security domain and does not come with that age-old credibility but the domain they are offering security to is also a relatively nascent domain. So it may be worth trying for a couple of years. The updates they are releasing or planning to release must be well spread out. It will help the consumers send notifications beforehand and follow-ups needed after the update has been released. Review collected by and hosted on G2.com.

DEEPAK K.
DK
Manager
Enterprise (> 1000 emp.)
"Best IoT Software Solutions to Secure IoT Devices"
What do you like best about Keyfactor Command for IoT?

The Best part of this software is it will provide best solution to secure IoT Device and it has the best feature to process data with in a system and out of the system. On a Trail base we decided use this solution to IoT Devices and this software has best solution and service. Review collected by and hosted on G2.com.

What do you dislike about Keyfactor Command for IoT?

Like the best solution, this Keyfactor provides like the bugs are getting raised which need to be cleared by Solution provider. Review collected by and hosted on G2.com.

There are not enough reviews of Keyfactor Command for IoT for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,107)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(388)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
3
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.4
(117)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
4
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(100)
Microsoft Defender for IoT is a comprehensive security solution designed to protect Internet of Things (IoT and operational technology (OT environments. It offers real-time asset discovery, vulnerability management, and cyberthreat protection for industrial infrastructures, including industrial control systems (ICS and OT networks. By providing complete visibility into all IoT and OT assets, Defender for IoT enables organizations to manage security posture effectively and reduce the cyberattack surface area. Its agentless, network-layer monitoring ensures seamless integration with existing systems without impacting performance. Key Features and Functionality: - Context-Aware Visibility: Gain comprehensive insights into all IoT and OT assets, including device details, communication protocols, and behaviors. - Risk-Based Security Posture Management: Identify and prioritize vulnerabilities using a risk-prioritized approach to minimize the cyberattack surface. - Cyberthreat Detection with Behavioral Analytics: Utilize IoT and OT-aware behavioral analytics and machine learning to detect and respond to cyberthreats effectively. - Agentless Monitoring: Deploy non-invasive, passive monitoring that integrates seamlessly with diverse industrial equipment and legacy systems. - Unified Security Operations: Integrate with Microsoft Sentinel and other security information and event management (SIEM systems for centralized monitoring and governance. Primary Value and Problem Solved: Defender for IoT addresses the critical need for robust security in IoT and OT environments, which are often vulnerable due to unpatched devices, misconfigurations, and lack of visibility. By providing real-time asset discovery, continuous monitoring, and advanced threat detection, it empowers organizations to proactively manage risks, ensure compliance, and protect critical infrastructure from evolving cyberthreats. This solution enables seamless integration with existing security operations, fostering a unified approach to IT and OT security.
5
Akeyless Identity Security Platform Logo
Akeyless Identity Security Platform
4.6
(82)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
6
Doppler secrets management platform Logo
Doppler secrets management platform
4.8
(61)
Doppler’s developer-first secrets management platform empowers teams to seamlessly orchestrate, govern, and control secrets across any environment at scale.
7
AWS IoT Device Defender Logo
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
8
Rayven Logo
Rayven
4.9
(57)
No/low/full-code platform for building apps, AI tools + automations. Rayven enables you to integrate systems, unlock data sources, and build custom apps with business-orientated AI capabilities, simply.
9
Azure Key Vault Logo
Azure Key Vault
4.5
(55)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
10
DoveRunner Logo
DoveRunner
4.7
(51)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Keyfactor Command for IoT
View Alternatives