Software Alternatives, Accelerators & Startups

Keystash.io VS Centrify

Compare Keystash.io VS Centrify and see what are their differences

Keystash.io logo Keystash.io

Centralized Linux user and SSH key management software

Centrify logo Centrify

Our Enterprise Mobility Management (EMM) solutions help gain control of mobile access security, minimize threats, manage devices & more. Start a FREE Trial!
  • Keystash.io Landing page
    Landing page //
    2022-05-25

SSH Key Management software that synchronizes SSH Keys with your authorizedkeys files across your fleet of servers. Manage user accounts, sudoers files, two factor authentication and authorizedkeys on Linux servers.

  • Centrify Landing page
    Landing page //
    2023-06-21

Keystash.io

$ Details
freemium £25.0 / Monthly (Includes 10 Users and 30 Hosts)
Platforms
Browser REST API
Release Date
2022 April
Startup details
Country
United Kingdom
Employees
1 - 9

Centrify

Pricing URL
-
$ Details
-
Platforms
-
Release Date
-

Keystash.io features and specs

  • SSH Key Management
  • Two Factor Authentication (2FA)
  • SSH Service Managment
  • Audit Trail
  • Single Sign-On
  • RESTful API

Centrify features and specs

  • Enhanced Security
    Centrify, now part of CyberArk's Access Management solutions, provides robust security features like multi-factor authentication (MFA) and adaptive access controls that help protect sensitive information.
  • Comprehensive Access Management
    Centrify offers a unified platform for managing access across various environments—on-premises, cloud, and hybrid. This simplifies the process and reduces administrative overhead.
  • Zero Trust Model
    The platform supports a Zero Trust security model, meaning it verifies every user and device trying to access the network, enhancing overall security posture.
  • Scalability
    Centrify is scalable and capable of handling the needs of both small businesses and large enterprises, making it a versatile option.
  • Compliance
    The solution helps organizations meet compliance requirements by offering detailed reporting and audit trails.

Possible disadvantages of Centrify

  • Cost
    Centrify, as part of CyberArk's suite, can be expensive, particularly for small to mid-sized businesses.
  • Complex Implementation
    Implementing Centrify can be complex and time-consuming, requiring specialized knowledge and potentially impacting existing workflows during the setup phase.
  • Learning Curve
    Users may face a steep learning curve due to the platform’s extensive features and capabilities. Training may be required for effective utilization.
  • Customer Support
    Some users have reported that customer support can be slow to respond and not always as helpful as expected.
  • Integration Issues
    Although Centrify integrates with numerous third-party applications, some users have experienced difficulties with specific integrations, requiring additional support or customization.

Keystash.io videos

Linux User and SSH Key Management Demo

Centrify videos

Centrify Privilege Service Product Overview

More videos:

  • Review - Centrify Identity Service: B2B Federation Overview
  • Review - Lab 11: Configuring and Testing Group Policies with Centrify in UNIX/Linux Systems

Category Popularity

0-100% (relative to Keystash.io and Centrify)
Identity And Access Management
Cyber Security
100 100%
0% 0
Identity Provider
12 12%
88% 88
SSH
100 100%
0% 0

User comments

Share your experience with using Keystash.io and Centrify. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Keystash.io and Centrify

Keystash.io Reviews

We have no reviews of Keystash.io yet.
Be the first one to post

Centrify Reviews

20 Identity Management Solutions You Should Know
Centrify’s constellation of zero-trust products minimize security threats in myriad ways. Adaptive multi-factor authentication is just the beginning. Centrify products also ensure that not even administrators get automatic access to sensitive data. Instead, after requesting the data, all users must explain why they need it and for how long. They’re then connected to it...
Source: builtin.com

What are some alternatives?

When comparing Keystash.io and Centrify, you can also consider the following products

Smallstep SSH - Single Sign-on SSH

OneLogin - On-demand SSO, directory integration, user provisioning and more

AuthAnvil - AuthAnvil software is an integrated identity and access management tool designed to help IT managers service their networks, infrastructure network, and ensure that devices are safe and secure at all times. Read more about AuthAnvil.

Keyfactor Command - Keyfactor Command is a web-based platform that offers you AI-based tools to manage and handle the identity of the organization and allows you to access the data from any remote location as it is a cloud-based platform.

TeamPassword - TeamPassword helps you manage and share access to the apps, services, and tools your team needs to keep projects moving.

strongDM - Trust strongDM to manage an engineers access to everything