Average Ratings 11 Ratings
Average Ratings 0 Ratings
Description
Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at.
SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system.
With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them.
In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
Description
Utilize encryption keys to safeguard your secrets, personal details, and sensitive information stored in the cloud. You can create and remove keys, configure access policies, and execute key rotation through the management console, CLI, or API. Yandex KMS supports both symmetric and asymmetric cryptographic methods. With the REST or RPC API, you can encrypt and decrypt small data sets, including secrets and local encryption keys, in addition to signing data through electronic signature protocols. You have control over who can access the encrypted information, while Yandex KMS guarantees the security and durability of the keys. Additionally, Hardware Security Modules (HSMs) are provided for enhanced security. For small data encryption, you can use the SDKs available in Java or Go, while larger data sets can be encrypted using popular libraries like the AWS Encryption SDK and Google Tink. The service integrates seamlessly with Yandex Lockbox, allowing you to encrypt secrets with your own keys. Furthermore, encryption keys can also be employed to secure secrets and data within the Managed Service for Kubernetes, providing robust protection across various platforms. This comprehensive approach ensures that your sensitive information remains secure from unauthorized access.
API Access
Has API
API Access
Has API
Integrations
Google Workspace
Kubernetes
Microsoft 365
Tink
Yandex Cloud
Yandex Lockbox
Yubico YubiKey
Integrations
Google Workspace
Kubernetes
Microsoft 365
Tink
Yandex Cloud
Yandex Lockbox
Yubico YubiKey
Pricing Details
Free
Free Trial
Free Version
Pricing Details
$0.0230 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
SharePass
Founded
2020
Country
Australia
Website
sharepass.com
Vendor Details
Company Name
Yandex
Founded
1997
Country
Russia
Website
cloud.yandex.com/en/services/kms
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking