UKM Universal SSH Key ManagerSoftware Diversified Services
|
||||||
Related Products
|
||||||
About
The IBM® zSecure Suite adds layers of security assurance, including audits, alerts, administration, reporting and authentication, that enhance the security and risk management in IBM Z® hardware, software, virtualization, and standard external security managers (ESMs) such as IBM RACF, CA ACF2, and CA Top Secret. The zSecure Suite automates security administrative tasks to help increase efficiency and reduce errors, detects internal and external threats, issues real-time alerts, and monitors compliance. Automates security administrative tasks to help increase efficiency and reduce errors. Effective identity governance can help enforce compliance management of regulations and standards. Detect threats, issue real-time alerts, and monitory compliance such as pervasive encryption utilization for GDPR. Secure strong authentication to strengthen user controls with integration for easy administration.
|
About
UKM discovers, remediates, and manages SSH user keys without interrupting business systems or impeding workflow. UKM finds and tracks existing keys, verifies trusted connections, renews authorizations, and removes inactive keys as needed. No changes to processes, no guessing about compliance. And it cuts costs along the way. UKM is the solution for any size business that is concerned about managing and safeguarding the secure shell environment. UKM automatically traces SSH key usage and updates authorizations while detecting and removing potentially dangerous, unused keys. All without disrupting operations. Eliminate all the overhead costs related to SSH keys by centralizing oversight and automating administration. Savings can reach millions of dollars per year. While SSH is the gold standard for securing data transfers, improperly managed SSH keys represent a significant security risk. UKM solves this issue and assures compliance.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT departments seeking a tool to amplify their user authorization capabilities, administrative efficiency, and cybersecurity compliance
|
Audience
Teams and organizations wanting a solution to centralize, simplify, and automate their SSH key management operations
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationIBM
Founded: 1911
United States
www.ibm.com/security/mainframe-security/zsecure
|
Company InformationSoftware Diversified Services
Founded: 1982
United States
www.sdsusa.com/security-software/universal-ssh-key-manager/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
|
|
|