Skip to main content
TrustRadius
Keystash

Keystash

Overview

What is Keystash?

A centralised platform to radically increase Linux security by managing users, keys, two factor authentication and SSH connections. The solution helps to ease management and increase security by moving to a cloud based SSH key management system.

Read more
Recent Reviews

TrustRadius Insights

Users of Keystash have found that the software effectively solves various business problems related to server access management. By using …
Continue reading
TrustRadius

Leaving a review helps other professionals like you evaluate Certificate Lifecycle Management Software

Be the first one in your network to review Keystash, and make your voice heard!

Return to navigation

Pricing

View all pricing

Essentials

$25

Cloud
per month includes 30 servers

Pro

$95

Cloud
per month includes 125 servers

Business

$179

Cloud
per month includes 250 servers

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.keystash.io/pricing.html

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Details

What is Keystash?

Keystash Video

Keystash Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users of Keystash have found that the software effectively solves various business problems related to server access management. By using Keystash, users have been able to save time by eliminating manual management of user access for servers. The software's seamless installation and setup process have provided a hassle-free experience for users. Additionally, Keystash has proven to be cost-efficient, allowing users to reduce overall costs.

In terms of security, Keystash ensures the protection of hash keys and SSH pem keys, enhancing authentication and compliance. The software enables two-factor authentication for all servers, providing an added layer of security. This not only helps enforce IT security policies but also ensures compliance with industry security standards.

Keystash is also compatible with cloud environments, offering compatibility in the cloud. This feature has been particularly beneficial for software developers who can securely store SSH keys in a central database. As a result, access management for multiple projects becomes simplified and streamlined.

Another significant advantage of Keystash is its ability to provide comprehensive audit capabilities. The software records all user activities and changes made to permissions or settings, allowing for better visibility and governance in Linux environments. This aligns with ISO, SOC2, and PCI DSS standards.

Furthermore, users have reported that Keystash increases security by moving to a cloud-based system, reducing the burden on internal IT departments. Helpdesk users also benefit from the software's security features in solving various security issues.

Overall, Keystash has proven to be a valuable solution for businesses looking for efficient server access management while ensuring security and compliance. Whether it's eliminating manual processes, enhancing authentication, simplifying access management, or providing audit capabilities, Keystash offers a comprehensive set of features that address various business challenges related to server access management.

Ease of Use: Many users have found Keystash to be easy to set up and use, without any complexity. The user interface is quick, fast, and easy to navigate, allowing for efficient management of multiple keys and users.

Excellent Customer Support: Users have praised the excellent customer support provided by Keystash. The support team is helpful and responsive in addressing any questions or concerns that arise during implementation or usage of the software.

Increased Security: Several reviewers appreciate that Keystash enhances security through features like two-factor authentication, access levels, and a centralized location for managing all SSH keys. The algorithm used by Keystash to generate secure keys has also been commended. This increased security helps ensure compliance and reduces the IT workload associated with key management across the company.

Difficult User Interface: Some users have found the user interface of Keystash to be challenging to navigate and work with, suggesting that it is not as intuitive or user-friendly as they would prefer.

Non-User-Friendly Onboarding Process: Several reviewers have mentioned that the onboarding process for creating SSH keys in Keystash is not user-friendly and can be time-consuming, especially for those who are not technically inclined. This could potentially deter non-technical users from fully utilizing the software.

Lack of Comprehensive Documentation: The absence of a guidebook or comprehensive documentation has been highlighted by some users as a drawback. They feel that having detailed instructions and reference materials would make it easier for them to understand and follow along with the functionalities of Keystash.

Sorry, no reviews are available for this product yet

Return to navigation