Best IT Management Software for Azure Key Vault

Find and compare the best IT Management software for Azure Key Vault in 2026

Use the comparison tool below to compare the top IT Management software for Azure Key Vault on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    JSCAPE MFT Server Reviews
    See Software
    Learn More
    JSCAPE by Redwood is a secure managed file transfer (MFT) software that automates complex file workflows, consolidating manual processes, custom scripts and siloed tools into a single, reliable platform. Low-code automation triggers enable IT teams to orchestrate file transfers across Windows, Linux, macOS, Solaris and any other platform, with unlimited users, trading partners and concurrent connections included and no additional middleware required. JSCAPE delivers enterprise-grade security, backed by an unblemished track record since 1999 and active third-party certifications that most MFT providers don't hold: SOC 2 Type 1 and Type 2, ISO 27001, Drummond Certified™, and FIPS 140-2 and 140-3 validated encryption. Quarterly penetration testing and annual third-party audits keep your environment audit-ready year-round. The solution handles any file size and any protocol — SFTP, FTP/S, HTTP/S, AS2, OFTP2, WebDAV, and more — while meeting compliance requirements for HIPAA, PCI DSS, SOX, GDPR and GLBA. It also fits cleanly into any environment (on-premises, cloud, hybrid, containerized or SaaS), with native integrations for Microsoft Azure, AWS, IBM Cloud, CyberArk, Box, Dropbox and leading workload automation solutions like RunMyJobs. Trusted by 1,000+ organizations in 57+ countries, JSCAPE includes 24/7/365 expert technical support with an 8-minute median response time and online training at no extra cost in every plan. Request a personalized demo today.
  • 2
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure serves as a versatile cloud computing platform that facilitates swift and secure development, testing, and management of applications. With Azure, you can innovate purposefully, transforming your concepts into actionable solutions through access to over 100 services that enable you to build, deploy, and manage applications in various environments—be it in the cloud, on-premises, or at the edge—utilizing your preferred tools and frameworks. The continuous advancements from Microsoft empower your current development needs while also aligning with your future product aspirations. Committed to open-source principles and accommodating all programming languages and frameworks, Azure allows you the freedom to build in your desired manner and deploy wherever it suits you best. Whether you're operating on-premises, in the cloud, or at the edge, Azure is ready to adapt to your current setup. Additionally, it offers services tailored for hybrid cloud environments, enabling seamless integration and management. Security is a foundational aspect, reinforced by a team of experts and proactive compliance measures that are trusted by enterprises, governments, and startups alike. Ultimately, Azure represents a reliable cloud solution, backed by impressive performance metrics that validate its trustworthiness. This platform not only meets your needs today but also equips you for the evolving challenges of tomorrow.
  • 3
    Devolutions Remote Desktop Manager Reviews
    Top Pick
    Remote Desktop Manager (RDM) consolidates over 50 remote connection types—like RDP (Remote Desktop Protocol), SSH (Secure Shell), and VPNs (Virtual Private Network)—into a single, secure interface. Teams can manage credentials, launch sessions, and monitor access with built-in role-based access control (RBAC) and logging. Add the Remote Connection & IT Management package to pair RDM with Gateway, Hub (SaaS) or Server (on-prem) for just-in-time access, centralized vaulting, and full session oversight.
  • 4
    Azure Blob Storage Reviews
    Azure Blob Storage offers a highly scalable and secure object storage solution tailored for a variety of applications, including cloud-native workloads, data lakes, high-performance computing, archives, and machine learning projects. It enables users to construct data lakes that facilitate analytics while also serving as a robust storage option for developing powerful mobile and cloud-native applications. With tiered storage options, users can effectively manage costs associated with long-term data retention while having the flexibility to scale up resources for intensive computing and machine learning tasks. Designed from the ground up, Blob storage meets the stringent requirements for scale, security, and availability that developers of mobile, web, and cloud-native applications demand. It serves as a foundational element for serverless architectures, such as Azure Functions, further enhancing its utility. Additionally, Blob storage is compatible with a wide range of popular development frameworks, including Java, .NET, Python, and Node.js, and it uniquely offers a premium SSD-based object storage tier, making it ideal for low-latency and interactive applications. This versatility allows developers to optimize their workflows and improve application performance across various platforms and environments.
  • 5
    CertPing Reviews

    CertPing

    CertPing

    $1.99 per month
    CertPing serves as a comprehensive platform for observability and security, leveraging artificial intelligence to assist organizations in safeguarding their online assets by relentlessly tracking website availability and response times. It automates the management of SSL/TLS certificates, including their issuance, rotation, and deployment, while also identifying brand impersonation threats such as phishing attempts, typosquatting, and similar-looking domains. This innovative solution integrates uptime monitoring, SSL health insights, incident communications through public status pages, and threat intelligence into a singular dashboard that showcases real-time metrics, historical data, and alerts, empowering teams to swiftly address any outages or security issues. Moreover, CertPing’s proactive brand defense features continuously monitor for unauthorized domain registrations and phishing attempts that could jeopardize user trust. In addition to its monitoring capabilities, CertPing also offers workflows for trademark protection and provides support for legal filings by collaborating with trusted partners, ensuring a comprehensive approach to online security and brand integrity.
  • 6
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 7
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 8
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 9
    CertSecure Manager Reviews

    CertSecure Manager

    Encryption Consulting LLC

    A single solution for certificate management, which helps automate and manage all certificates across Cloud Environments, On Premises, Hybrid IT Environments, and Kubernetes Clusters. It manages certificates throughout their entire lifecycle, including certificate issuance and monitoring, renewal, and revocation.
  • 10
    ContraForce Reviews
    Utilize ContraForce to streamline investigation workflows across multiple tenants, automate the remediation of security incidents, and provide outstanding managed security services. Achieve cost-effectiveness through scalable pricing while ensuring high performance tailored to your operational requirements. Enhance the speed and scale of your current Microsoft security infrastructure with effective workflows, integrated security engineering tools, and advanced multi-tenancy features. Benefit from response automation that adjusts to the context of your business, offering comprehensive protection for your clients from endpoints to the cloud, all without the need for scripting, agents, or coding. Centrally manage various Microsoft Defender and Sentinel customer accounts, along with incidents and cases from other XDR, SIEM, and ticketing systems. Experience a consolidated investigation platform where all your security alerts and data are accessible in one place. With ContraForce, you can seamlessly conduct threat detection, investigations, and response workflows in a unified environment, enhancing the overall efficiency and effectiveness of your security operations.
  • 11
    Azure Confidential Computing Reviews
    Azure Confidential Computing enhances the privacy and security of data by safeguarding it during processing, rather than merely when it is stored or transmitted. It achieves this by encrypting data in memory through hardware-based trusted execution environments, enabling computations to occur only after the cloud platform has authenticated the environment. This method effectively blocks access from cloud service providers, administrators, and other privileged users. Additionally, it facilitates scenarios like multi-party analytics, where various organizations can collaboratively use encrypted datasets for joint machine learning efforts without disclosing their respective data. Users maintain complete control over their data and code, dictating which hardware and software can access them, and they can transition existing workloads using familiar tools, SDKs, and cloud infrastructures. Ultimately, this approach not only fosters collaboration but also significantly bolsters trust in cloud computing environments.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB