Skip to main content
TrustRadius
Unbound Crypto-of-Things

Unbound Crypto-of-Things

Overview

What is Unbound Crypto-of-Things?

Unbound CoT eliminates the single point of compromise by ensuring that sensitive keys that reside on untrusted and insecure devices never exist in the clear at any point in their lifecycle – not even when generated or while in use. With Unbound CoT, key…

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Encryption Key Management Software

Be the first one in your network to review Unbound Crypto-of-Things, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Unbound Crypto-of-Things?

Unbound CoT eliminates the single point of compromise by ensuring that sensitive keys that reside on untrusted and insecure devices never exist in the clear at any point in their lifecycle – not even when generated or while in use. With Unbound CoT, key material is never whole. Rather, each key…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is HashiCorp Vault?

HashiCorp offers Vault, an encryption tool of use in the management of secrets including credentials, passwords and other secrets, providing access control, audit trail, and support for multiple authentication methods. It is available open source, or under an enterprise license.

What is Yubico YubiKeys?

Yubico YubiKeys make the internet safer with phishing-resistant multi-factor authentication (MFA) by providing simple and secure access to computers, mobile devices, servers, and internet accounts. The Yubico YubiKey stops account takeovers at scale by mitigating phishing and ransomware attacks,…

Return to navigation

Product Details

What is Unbound Crypto-of-Things?

Unbound CoT eliminates the single point of compromise by ensuring that sensitive keys that reside on untrusted and insecure devices never exist in the clear at any point in their lifecycle – not even when generated or while in use. With Unbound CoT, key material is never whole. Rather, each key exists as two random key shares. All operations are carried out without ever uniting the key shares. By eliminating the single point of compromise, Unbound CoT provides high level of security for most sensitive keys such as authentication, signing and encryption keys – ensuring resistance from cloning or tampering even on compromised devices.

Unbound Crypto-of-Things Features

  • Supported: Security token/hardware token replacement
  • Supported: Strong authentication

Unbound Crypto-of-Things Integrations

  • OpenSSL
  • Microsoft CNG
  • PKCS#11
  • Java (JCE)
  • SAML
  • Trusted Platform Module (TPM)
  • Intel SGX

Unbound Crypto-of-Things Technical Details

Deployment TypesOn-premise
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android
Supported LanguagesEnglish
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation