Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at KEYLOK, reclaim access to make changes.
Apicbase
Sponsored
Apicbase
Visit Website
Product Avatar Image
KEYLOK

By KEYLOK

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at KEYLOK, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with KEYLOK?

Apicbase
Sponsored
Apicbase
Visit Website
It's been two months since this profile received a new review
Leave a Review

KEYLOK Reviews & Product Details

Product Avatar Image

Have you used KEYLOK before?

Answer a few questions to help the KEYLOK community

KEYLOK Reviews (1)

Reviews

KEYLOK Reviews (1)

4.5
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
MANHAL A.
MA
Senior Project Engineer
Small-Business (50 or fewer emp.)
"Driverless Card Security technology"
What do you like best about KEYLOK?

It is easy to setup, driverless,high value security service for cross platform windows. It allows you to lock whatever you like in software, doesn't require any drivers to be installed. Review collected by and hosted on G2.com.

What do you dislike about KEYLOK?

Nothing as of now. New in market. Well designed. Review collected by and hosted on G2.com.

There are not enough reviews of KEYLOK for G2 to provide buying insight. Below are some alternatives with more reviews:

1
FortiDDoS Logo
FortiDDoS
4.5
(23)
FortiDDoS protects from both known and zero day attacks with very low latency. It's easy to deploy and manage, and includes comprehensive reporting and analysis tools.
2
Cisco Security Hardware Logo
Cisco Security Hardware
4.1
(19)
Networks are ever more complex. And devices are proliferating by the minute. It's harder to see what’s on the network, and it's harder to spot a threat. Our Network Visibility and Segmentation solution combines Cisco Stealthwatch Enterprise, the Cisco Identity Services Engine, and Cisco TrustSec technology. You get fast threat detection, highly secure access, and software-defined segmentation.
3
Juniper Networks Security Logo
Juniper Networks Security
4.1
(9)
Firewalls, Advanced Threat Protection, and Visibility, Management, and Analytics tools
4
Huawei Network Security Logo
Huawei Network Security
5.0
(1)
Introducing AI-based threat response, software-defined network-security defense, and intelligent security policy optimization, Huawei network security helps mitigate network security risks as customers go digital.
5
Helios RXPF Logo
Helios RXPF
(0)
Helios RXPF is a unique, fully scalable, hardware accelerated pattern matching solution for Security Analytics Acceleration (SAA) and content processing. The solution can be tuned for the desired combination of throughput, rule depth and complexity.
6
Blue Hexagon Logo
Blue Hexagon
(0)
Network Threat Protection Harnessing Deep Learning
7
OpenText Forensic Equipment Logo
OpenText Forensic Equipment
(0)
8
CloudStats Logo
CloudStats
(0)
Easy to use and potential to churn out viable results, CloudStats is one of the most trusted tools to do constant server monitoring. The server monitoring grants you an ability to choose your plan as per your needs.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
KEYLOK
View Alternatives