Skip to main content

Help us improve the Digital Marketplace - send your feedback

Keyfactor

Certificate Lifecycle Management - SaaS

Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

Features

  • Full Digital Certificate/TLS Certificate/x.509 Certificate Visibility
  • Full Digital Certificate/TLS Certificate/x.509 Certificate Management
  • Full Digital Certificate/TLS Certificate/x.509 Certificate Discovery
  • Self Service Enrollment
  • Granular Role Based Access Control (RBAC)
  • Full Digital Certificate/TLS Certificate/x.509 Certificate Reporting
  • Full Digital Certificate/TLS Certificate/x.509 Certificate Alerting

Benefits

  • Easily discover & manage all of your digital certificates
  • Multiple discovery methodologies allows all certificates to be discovered
  • Prevent certificate related service outages
  • Provide easy access to security-approved certificates
  • Identify & reduce certificate related Shadow IT
  • Simplify operations and stay ahead of unexpected outages
  • Ensure continuous compliance for every certificate

Pricing

£50,000 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sales@keyfactor.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 7 9 4 7 0 6 4 6 6 9 2 6 1 9

Contact

Keyfactor Keyfactor Sales Department
Telephone: +46 8 735 61 00
Email: Sales@keyfactor.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
EJBCA SaaS
EJBCA PKI Appliances
Cloud deployment model
Public cloud
Service constraints
N/A
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Any issues reported via email will be initially classified as Severity 2 or lower.

Standard Support:
Severity 2 - 2 Hours
Severity 3 - 6 Hours
Severity 4 - 1 Day

Premium Support:
Severity 2 - 1 Hour
Severity 3 - 4 Hours
Severity 4 - 8 Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support 8-5 / Premium Support 24x7 (optional)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
User documentation and project planning.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
User data is deleted at end of contract and cannot be taken with them.
End-of-contract process
User data is deleted at the end of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
Keyfactor's Command comes with a web based console application that supports all modern web browsers. The Management Portal is the command and control center for Keyfactor Command. From here, you can get a quick glance at the health of your PKI and a sense of how it is being used by visiting the dashboard, or delve into details of certificates using the certificate search feature. The Management Portal is also used to configure workflow and email notifications, enroll for certificates, and configure options that are used across the whole of the Keyfactor Command product
Accessibility standards
WCAG 2.1 A
Accessibility testing
Keyfactor complies with the WCAG key areas of compliance.

 

Perceivable

Text alternatives – All images have hover over text.
Time-based media - No video is used.
Adaptability – Keyfactor's UI is built on react and React-headings maintains the proper hierarchy of headings, no matter the component structure
Distinguishable – Dashboards and reports use color for charts and graphs. All components have hover over text.
Operable

Keyboard Accessible – Keyfactor can be navigated via a keyboard.
Enough Time – No moving or blinking content is used.
Seizures and Physical Reactions – No flashing is used.
Navigable – All links are clearly defined
Input Modalities – All navigation is single point and no multipoint gestures are used.
Understandable

Readable – All language is specified in the mark-up
Predictable – All actions are on button click
Input Assistance – All input errors are in text
Robust

Compatible – All HTML mark-up is properly formed and has proper start and end tags.
API
Yes
What users can and can't do using the API
The Keyfactor Command solution exposes an API to allow third-party software to integrate with the advanced certificate enrollment and management features of Keyfactor Command in a secure manner and to provide a mechanism for automating routine or bulk tasks that would be cumbersome to perform through the browser-based user interface. The API complements the web components of Keyfactor Command and offer a number of HTTP method calls that provide similar functionality to that available within the Management Portal's user interface, but which can be accessed programmatically by any system capable of making web requests. The API has the following goals and constraints:

-Provide a simple interface to make integration easy for third parties.
-Develop interoperability between different technology frameworks and operating systems.
-Support common certificate enrollment and management tasks.
-Deliver a securable interface.
-Preserve backward-compatibility so that existing clients continue to work, where possible.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Keyfactor Command provides a highly-customizable dashboard that helps in identifying anomalies, security risks, and other administrator-specified criteria.

The Keyfactor Orchestrator is also built to serve as a framework for enabling custom automation to endpoints if necessary.  There is an open source SDK available to help make building these integrations easy.   Once built, the integration will be able to take advantage of the built in job management and scheduling functionality within the platform to schedule certificate management jobs and automated inventory processes.

Scaling

Independence of resources
Each Command customer is provisioned a Azure dedicated environment for their contracted service. One customer does not affect another customer from a load, operations or security perspective.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported by API and within the application.
Data export formats
  • CSV
  • Other
Other data export formats
JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • API
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA Attached within the contractual documentation.
Approach to resilience
Command is completely hosted in Azure, and commonly understood multi availability zone (AZ) resiliency is fully leveraged by this Command service.
Outage reporting
Scheduled and unscheduled outages are communicated by Email.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Roles are all custom designed within the system. Roles can be defined to control not only what the user is allowed to do within the system, but also what certificates they are allowed to perform actions on.   There are many functions within the system can be added to a specific role. A full list of user capabilities that can be delegated within the system can be found in the Keyfactor Command Reference guide under "Security Role Permission".
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
IP Whitelisting

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Marcum
ISO/IEC 27001 accreditation date
10/1/2023
What the ISO/IEC 27001 doesn’t cover
Security Scoped
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow the ISO27001 policy expectations. Keyfactor utilizes annual third-party auditing to validate compliance with our policies to the above standards.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Ticketing systems track any changes with approvals. A risk analysis is conducted on each change prior to approval.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Active monitoring of threats are conducted at the agent, network and application level. Patching is conducted monthly by the Keyfactor Cloud team. Keyfactor utilized multiple sources (CVE.org / SOC team) to ensure we maintain the security posture and awareness.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Alerting from SOC assets and network monitoring notify Keyfactor team members for investigation. If a compromise is detected, the incident response plan is started immediately via a call tree.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our predefined process is configured to be started when reported by a user, employee, or vendor. This can be done by a support ticket, email, or other communication tool. Incident reports are internal documents.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Keyfactor strives to manage our climate impact within our corporate and commercial environments

Tackling economic inequality

Keyfactor engages in continual research, management, and training to ensure employees are treated fairly.

Equal opportunity

Keyfactor engages in continual research, management, and training to ensure employees are treated fairly.

Wellbeing

Keyfactor engages in continual research, management, and training to ensure employees are given access to multiple wellbeing tools.

Pricing

Price
£50,000 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sales@keyfactor.com. Tell them what format you need. It will help if you say what assistive technology you use.