Skip to main content

Help us improve the Digital Marketplace - send your feedback

UNSUNG LIMITED

Keyfactor Command

Manage & automate digital/TLS certificates in
cloud, on-premise & hybrid environments with CA
agnostic Keyfactor Command. Discover all of
your certificates, public & private, across your
enterprise & achieve single screen visibility &
control.

Features

  • 100% visibility with real-time CA synchronization and network SSL/TLS scanning
  • Metadata to tag and group certificates based on custom attributes
  • Reporting and alerting with out-of-the-box and custom reports
  • Simple, powerful UI with an interactive dashboard
  • Role-based controls ensure consistent policy application for certificate management
  • Orchestrators and plugins to automate issuance and provisioning

Benefits

  • Prevent certificate-related outages caused by unknown and unmanaged certificates
  • Identify and remediate risks posed by vulnerable and near-expired certificates
  • Eliminate manual, time-consuming processes to request and renew certificates
  • Establish a single machine identity control plane across all environments
  • Simplify audits and compliance requirements with dashboards and detailed reports

Pricing

£40,250 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@unsungltd.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 2 8 3 7 6 2 0 5 6 3 0 0 2 6

Contact

UNSUNG LIMITED Richard Warwick-Smith
Telephone: 07961166249
Email: info@unsungltd.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
EJBCA SaaS EJBCA PKI Appliances
Cloud deployment model
Public cloud
Service constraints
N/A
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Any issues reported via email will be initially
classified as Severity 2 or lower. Standard
Support: Severity 2 - 2 Hours Severity 3 - 6
Hours Severity 4 - 1 Day Premium Support:
Severity 2 - 1 Hour Severity 3 - 4 Hours Severity
4 - 8 Hour
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support 8-5 / Premium Support 24x7
(optional)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
User documentation and project planning.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
User date is deleted at end of contract and
cannot be taken with them.
End-of-contract process
User data is deleted at the end of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
Keyfactor's Command comes with a web based
console application that supports all modern web
browsers. The Management Portal is the
command and control center for Keyfactor
Command. From here, you can get a quick
glance at the health of your PKI and a sense of
how it is being used by visiting the dashboard, or
delve into details of certificates using the
certificate search feature. The Management
Portal is also used to configure workflow and
email notifications, enroll for certificates, and
configure options that are used across the whole
of the Keyfactor Command product
Accessibility standards
WCAG 2.1 A
Accessibility testing
Keyfactor complies with the WCAG key areas of
compliance. Perceivable Text alternatives – All
images have hover over text. Time-based
media - No video is used. Adaptability –
Keyfactor's UI is built on react and Reactheadings maintains the proper hierarchy of
headings, no matter the component structure
Distinguishable – Dashboards and reports use
color for charts and graphs. All components have
hover over text. Operable Keyboard Accessible –
Keyfactor can be navigated via a keyboard.
Enough Time – No moving or blinking content is
used. Seizures and Physical Reactions – No
flashing is used. Navigable – All links are clearly
defined Input Modalities – All navigation is single
point and no multipoint gestures are used.
Understandable Readable – All language is
specified in the mark-up Predictable – All actions
are on button click Input Assistance – All input
errors are in text Robust Compatible – All HTML mark-up is properly formed and has proper start
and end tags.
API
Yes
What users can and can't do using the API
The Keyfactor Command solution exposes an
API to allow third-party software to integrate with
the advanced certificate enrollment and
management features of Keyfactor Command in
a secure manner and to provide a mechanism for
automating routine or bulk tasks that would be
cumbersome to perform through the browserbased user interface. The API complements the
web components of Keyfactor Command and
offer a number of HTTP method calls that provide
similar functionality to that available within the
Management Portal's user interface, but which
can be accessed programmatically by any
system capable of making web requests. The API
has the following goals and constraints: -Provide
a simple interface to make integration easy for
third parties. -Develop interoperability between
different technology frameworks and operating
systems. -Support common certificate enrollment
and management tasks. -Deliver a securable
interface. -Preserve backward-compatibility so
that existing clients continue to work, where
possible.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Keyfactor Command provides a highly customizable dashboard that helps in identifying
anomalies, security risks, and other
administrator-specified criteria. The Keyfactor
Orchestrator is also built to serve as a framework
for enabling custom automation to endpoints if
necessary. There is an open source SDK
available to help make building these integrations
easy. Once built, the integration will be able to
take advantage of the built in job management and scheduling functionality within the platform to
schedule certificate management jobs and
automated inventory processes.

Scaling

Independence of resources
Each Command customer is provisioned a Azure
dedicated environment for their contracted
service. One customer does not affect another
customer from a load, operations or security
perspective.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Keyfactor

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported by API and within the
application.
Data export formats
  • CSV
  • Other
Other data export formats
JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • API
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA's are detailed with the product terms and conditions.
Approach to resilience
Command is completely hosted in Azure, and
commonly understood multi availability zone (AZ)
resiliency is fully leveraged by this Command
service
Outage reporting
Scheduled and unscheduled outages are
communicated by Email

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Roles are all custom designed within the
system. Roles can be defined to control not only
what the user is allowed to do within the system,
but also what certificates they are allowed to
perform these roles to. There are many
functions within the system can be added to a
specific role. A full list of user capabilities that
can be delegated within the system can be found
in the Keyfactor Command Reference guide
under "Security Role Permission"
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO27001 is forecast for July 2024
  • Cyber Essentials Plus is forecast for July 2024

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow the ISO27001 / SOC2 Type 2 policy
expectations. Keyfactor utilizes annual third-party
auditing to validate compliance with our policies
to the above standards.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Ticketing systems track any changes with
approvals. A risk analysis is conducted on each
change prior to approval
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Active monitoring of threats are conducted at the
agent, network and application level. Patching is
conducted monthly by the Keyfactor Cloud team.
Keyfactor utilized multiple sources (CVE.org /
SOC team) to ensure we maintain the security
posture and awareness.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Alerting from SOC assets and network
monitoring notify Keyfactor team members for
investigation. If a compromise is detected, the
incident response plan is started immediately via
a call tree.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our predefined process is configured to be
started when reported by a user, employee, or
vendor. This can be done by a support ticket,
email, or other communication tool. Incident
reports are internal documents.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Wellbeing

Fighting climate change

Unsung have the majority of our staff working remotely which reduces our climate impact. We also book all of our business travel through Travel Perk which allows us to offset corporate travel emissions.

Tackling economic inequality

Unsung are committed to collaboration, innovation and responsibility. We prioritise developing a diverse supply chain and work with startups and SMEs to foster inclusivity and economic growth.
Our solutions emphasise innovation and disruptive technologies to enhance cost effectiveness and quality. We are focused on developing scalable, future-proof delivery methods.
We prioritise collaboration and responsible practices to ensure operational continuity. We engage with our stakeholders to build support for resilience and capacity building, creating a collaborative ecosystem focused on sustainable growth and mutual success.

Wellbeing

Unsung are committed to improving health and wellbeing for our staff. We offer flexible working and remote working options allowing for a work-life balance that allows and supports physical and mental health.
Additionally, we provide subscriptions to the meditation app Calm which promotes mental wellness.
These initiatives enhance the wellbeing of our workforce and set a positive example.

Pricing

Price
£40,250 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Multiple options: Community edition (limited
functionality, not advised for governments).
POC/test licenses: 1 month time cap for a VM for
testing purposes.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@unsungltd.com. Tell them what format you need. It will help if you say what assistive technology you use.