By using this service, you agree to these terms and conditions:
DATA COLLECTION: This service collects data about your activity as well as certificate and other checks it performs on your behalf. We do not collect any personal or other identifiable data beyond what is necessary for the provision of the described services.
USE OF EMAIL ADDRESS: The only personally identifiable information we collect and store is your email address. We only use it to send weekly certificate planning emails with occasional updates regarding our certificate services.
LIABILITY: You use our services at your own risk. Our services are provided on an 'as is' and 'as available' basis. We are not liable for damages, direct or consequential, resulting from any failure to provide service, suspension of service, or termination of service. We do not guaranty the availability of the services. You agree not to hold us responsible for data loss or interruption of service of any kind.
KeyChest of Enigma Bridge is the tool you need to stay on top of all your certificates and
your boss, if you have any.
You can use KeyChest to plan your renewals, get your weekly inventory summary and present
KPIs (key performance indicators) to your boss or your team.
We don’t mind if you use KeyChest for your web servers, email servers, web services, or to keep your infrastructure running. We treat all certificates equal, whether you paid $500 for each, got them free from Let's Encrypt, or created them yourself.
When you create an account, you can quickly populate your dashboard using domain names with wildcards to search for server and print the first set of KPIs within minutes.
The following table compares features of KeyChest with Letsmonitor.org.
Our plan is to keep this service free, including evolutionary features. We have some thoughts about subscriptions, but these will be only for substantial extensions of KeyChest, and customization of this service for on-premise monitoring of your internal infrastructure.
Enterprise version will evolve around features, which make sense for large
on-premise instances, user/role management,
monitoring "sub-spaces", independent scanning agents, and security policies for
Get in touch if you want to chat.