Software Alternatives, Accelerators & Startups

Centrify VS Keyfactor Command

Compare Centrify VS Keyfactor Command and see what are their differences

Centrify logo Centrify

Our Enterprise Mobility Management (EMM) solutions help gain control of mobile access security, minimize threats, manage devices & more. Start a FREE Trial!

Keyfactor Command logo Keyfactor Command

Keyfactor Command is a web-based platform that offers you AI-based tools to manage and handle the identity of the organization and allows you to access the data from any remote location as it is a cloud-based platform.
  • Centrify Landing page
    Landing page //
    2023-06-21
  • Keyfactor Command Landing page
    Landing page //
    2023-04-22

Centrify videos

Centrify Privilege Service Product Overview

More videos:

  • Review - Centrify Identity Service: B2B Federation Overview
  • Review - Lab 11: Configuring and Testing Group Policies with Centrify in UNIX/Linux Systems

Keyfactor Command videos

No Keyfactor Command videos yet. You could help us improve this page by suggesting one.

+ Add video

Category Popularity

0-100% (relative to Centrify and Keyfactor Command)
Identity And Access Management
Identity Provider
71 71%
29% 29
Security & Privacy
30 30%
70% 70
Web Security
48 48%
52% 52

User comments

Share your experience with using Centrify and Keyfactor Command. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Centrify and Keyfactor Command

Centrify Reviews

20 Identity Management Solutions You Should Know
Centrify’s constellation of zero-trust products minimize security threats in myriad ways. Adaptive multi-factor authentication is just the beginning. Centrify products also ensure that not even administrators get automatic access to sensitive data. Instead, after requesting the data, all users must explain why they need it and for how long. They’re then connected to it...
Source: builtin.com

Keyfactor Command Reviews

We have no reviews of Keyfactor Command yet.
Be the first one to post

What are some alternatives?

When comparing Centrify and Keyfactor Command, you can also consider the following products

OneLogin - On-demand SSO, directory integration, user provisioning and more

Passly from ID Agent - Passly from ID Agent is an access and identity management software solution that allows you to provide the employees with the right and proper access based on their authority and company policy and regulations.

AuthAnvil - AuthAnvil software is an integrated identity and access management tool designed to help IT managers service their networks, infrastructure network, and ensure that devices are safe and secure at all times. Read more about AuthAnvil.

CyberArk Workforce Identity - Give your workforce simple and secure access to business resources with CyberArk Workforce Identity. Empower your workforce while keeping threats out.

TeamPassword - TeamPassword helps you manage and share access to the apps, services, and tools your team needs to keep projects moving.

GateKeeper Proximity - Proximity passwords for PC, Mac, websites, and desktop applications. Get instant authentication with GateKeeper wireless, hands-free security key. Anti-phishing, secure, passwordless, proximity-based wireless access token for computers/websites.