Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

AWS Secrets Manager is designed to safeguard the secrets necessary for accessing your applications, services, and IT resources. This service simplifies the processes of rotating, managing, and retrieving database credentials, API keys, and other sensitive information throughout their entire lifecycle. Through calls to the Secrets Manager APIs, users and applications can access secrets, which prevents the necessity of embedding sensitive data in plain text. Moreover, Secrets Manager features secret rotation with native integration for services like Amazon RDS, Amazon Redshift, and Amazon DocumentDB. The extensibility of the service also allows for the management of various other types of secrets, such as API keys and OAuth tokens. Additionally, it provides fine-grained permissions to control access to these secrets and facilitates centralized auditing of secret rotation across AWS Cloud resources, third-party services, and on-premises systems. By enabling safe rotation of secrets without requiring code deployments, AWS Secrets Manager effectively helps organizations fulfill their security and compliance mandates. Overall, this service enhances the management of sensitive information, making it an essential tool for modern application security.

Description

Astrix provides a robust solution for ensuring that your essential systems maintain secure connections to third-party cloud services by enhancing access management and threat mitigation for various elements such as API keys, OAuth tokens, and service accounts. Our agentless and straightforward deployment process allows you to identify and address risky app-to-app interactions that could lead to supply chain compromises, data leaks, and regulatory breaches. You will receive a comprehensive overview of all connections to your vital systems, including both internal and external applications, access keys, secrets, and operational workflows. Additionally, you can identify and eliminate over-privileged, unnecessary, and untrusted connections, and receive alerts if any application exhibits suspicious behavior. This proactive approach not only safeguards your infrastructure but also promotes a culture of security awareness within your organization.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
AWS Certificate Manager
AWS CloudTrail
Amazon
Amazon Ads
Amazon AppFlow
Amazon Augmented AI (A2I)
Amazon Redshift
BIM 360
Data Rover
Fabrication ESTmep
GitHub
GoDaddy Email
Google
Green Building Studio
Jovu
Procyon
Teradata VantageCloud
Unified.to

Integrations

Amazon Web Services (AWS)
AWS Certificate Manager
AWS CloudTrail
Amazon
Amazon Ads
Amazon AppFlow
Amazon Augmented AI (A2I)
Amazon Redshift
BIM 360
Data Rover
Fabrication ESTmep
GitHub
GoDaddy Email
Google
Green Building Studio
Jovu
Procyon
Teradata VantageCloud
Unified.to

Pricing Details

$0.40 per month
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Amazon

Founded

1994

Country

United States

Website

aws.amazon.com/secrets-manager/

Vendor Details

Company Name

Astrix Security

Founded

2021

Country

Israel

Website

astrix.security/

Product Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives

Knox Reviews

Knox

Pinterest
Entro Reviews

Entro

Entro Security