Kolide has a multitude of checks to help you measure and achieve your organization's compliance and security goals.
Achieve your security and compliance goals with ease.
No SQL Queries to Write
User/Okta Driven Remediation
Security Training for End-Users
You can use Device Checks to...
Find Unencrypted SSH Keys and Encrypt Them
SSH keys are commonly used to sign into servers, push code, and verify identities. It's important they are password-protected.