Best IT Management Software for CyberArk Conjur

Find and compare the best IT Management software for CyberArk Conjur in 2026

Use the comparison tool below to compare the top IT Management software for CyberArk Conjur on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Red Hat OpenShift Reviews
    Kubernetes serves as a powerful foundation for transformative ideas. It enables developers to innovate and deliver projects more rapidly through the premier hybrid cloud and enterprise container solution. Red Hat OpenShift simplifies the process with automated installations, updates, and comprehensive lifecycle management across the entire container ecosystem, encompassing the operating system, Kubernetes, cluster services, and applications on any cloud platform. This service allows teams to operate with speed, flexibility, assurance, and a variety of options. You can code in production mode wherever you prefer to create, enabling a return to meaningful work. Emphasizing security at all stages of the container framework and application lifecycle, Red Hat OpenShift provides robust, long-term enterprise support from a leading contributor to Kubernetes and open-source technology. It is capable of handling the most demanding workloads, including AI/ML, Java, data analytics, databases, and more. Furthermore, it streamlines deployment and lifecycle management through a wide array of technology partners, ensuring that your operational needs are met seamlessly. This integration of capabilities fosters an environment where innovation can thrive without compromise.
  • 2
    Docker Reviews
    Docker streamlines tedious configuration processes and is utilized across the entire development lifecycle, facilitating swift, simple, and portable application creation on both desktop and cloud platforms. Its all-encompassing platform features user interfaces, command-line tools, application programming interfaces, and security measures designed to function cohesively throughout the application delivery process. Jumpstart your programming efforts by utilizing Docker images to craft your own distinct applications on both Windows and Mac systems. With Docker Compose, you can build multi-container applications effortlessly. Furthermore, it seamlessly integrates with tools you already use in your development workflow, such as VS Code, CircleCI, and GitHub. You can package your applications as portable container images, ensuring they operate uniformly across various environments, from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE, and beyond. Additionally, Docker provides access to trusted content, including official Docker images and those from verified publishers, ensuring quality and reliability in your application development journey. This versatility and integration make Docker an invaluable asset for developers aiming to enhance their productivity and efficiency.
  • 3
    Kubernetes Reviews
    Kubernetes (K8s) is a powerful open-source platform designed to automate the deployment, scaling, and management of applications that are containerized. By organizing containers into manageable groups, it simplifies the processes of application management and discovery. Drawing from over 15 years of experience in handling production workloads at Google, Kubernetes also incorporates the best practices and innovative ideas from the wider community. Built on the same foundational principles that enable Google to efficiently manage billions of containers weekly, it allows for scaling without necessitating an increase in operational personnel. Whether you are developing locally or operating a large-scale enterprise, Kubernetes adapts to your needs, providing reliable and seamless application delivery regardless of complexity. Moreover, being open-source, Kubernetes offers the flexibility to leverage on-premises, hybrid, or public cloud environments, facilitating easy migration of workloads to the most suitable infrastructure. This adaptability not only enhances operational efficiency but also empowers organizations to respond swiftly to changing demands in their environments.
  • 4
    Amazon Web Services (AWS) Reviews
    Top Pick
    AWS is the leading provider of cloud computing, delivering over 200 fully featured services to organizations worldwide. Its offerings cover everything from infrastructure—such as compute, storage, and networking—to advanced technologies like artificial intelligence, machine learning, and agentic AI. Businesses use AWS to modernize legacy systems, run high-performance workloads, and build scalable, secure applications. Core services like Amazon EC2, Amazon S3, and Amazon DynamoDB provide foundational capabilities, while advanced solutions like SageMaker and AWS Transform enable AI-driven transformation. The platform is supported by a global infrastructure that includes 38 regions, 120 availability zones, and 400+ edge locations, ensuring low latency and high reliability. AWS integrates with leading enterprise tools, developer SDKs, and partner ecosystems, giving teams the flexibility to adopt cloud at their own pace. Its training and certification programs help individuals and companies grow cloud expertise with industry-recognized credentials. With its unmatched breadth, depth, and proven track record, AWS empowers organizations to innovate and compete in the digital-first economy.
  • 5
    Jenkins Reviews
    Jenkins, the premier open-source automation server, boasts an extensive library of plugins that facilitate the building, deployment, and automation of any project. Its versatility allows Jenkins to function not only as a straightforward continuous integration (CI) server but also as a comprehensive continuous delivery hub tailored for diverse projects. This self-sufficient, Java-based application is designed to operate immediately, with installation packages available for Windows, Linux, macOS, and various Unix-like platforms. Configuring Jenkins is straightforward through its intuitive web interface, which features real-time error checks and embedded assistance. With a plethora of plugins accessible in the Update Center, Jenkins seamlessly integrates with nearly every tool utilized in the continuous integration and delivery pipeline. Its plugin architecture allows for significant expandability, offering almost limitless options for enhancing Jenkins’s functionality. Additionally, Jenkins can efficiently allocate tasks across multiple machines, significantly accelerating the build, testing, and deployment processes across various environments, which ultimately leads to increased productivity. This adaptability makes Jenkins a key player in modern software development workflows.
  • 6
    TCPWave Reviews
    DDI automation is designed to assist enterprises and service providers in swiftly launching services, preventing outages, and facilitating a smooth transition to cloud transformation. With a scalable DDI architecture, organizations can effectively address surges, cloud requirements, and automation challenges. This architecture not only offers superior performance but also ensures a more favorable total cost of ownership, enabling businesses to expand both horizontally and vertically. By utilizing our advanced fault prevention solutions, mission-critical networks can be safeguarded against ransomware, phishing, botnet attacks, malware, and spyware, effectively mitigating security breaches. TCPWave stands out by providing both speed and security to fulfill the demands of modern, secure network infrastructures. Unlike typical IPAM software, TCPWave is highly scalable and can adapt to evolving needs. It is unwise to attempt retrofitting a two-decade-old legacy system to meet the contemporary requirements of DevOps and CloudOps. The innovative TCPWave DDI, equipped with over 1500 REST APIs, is specifically crafted to cater to the needs of today’s enterprises right out of the box, ensuring they can thrive in a rapidly changing digital landscape. This comprehensive solution not only enhances operational efficiency but also positions organizations to be resilient against emerging cyber threats.
  • 7
    Cloud Foundry Reviews
    Cloud Foundry simplifies and accelerates the processes of building, testing, deploying, and scaling applications while offering a variety of cloud options, developer frameworks, and application services. As an open-source initiative, it can be accessed through numerous private cloud distributions as well as public cloud services. Featuring a container-based architecture, Cloud Foundry supports applications written in multiple programming languages. You can deploy applications to Cloud Foundry with your current tools and without needing to alter the code. Additionally, CF BOSH allows you to create, deploy, and manage high-availability Kubernetes clusters across any cloud environment. By separating applications from the underlying infrastructure, users have the flexibility to determine the optimal hosting solutions for their workloads—be it on-premises, public clouds, or managed infrastructures—and can relocate these workloads swiftly, typically within minutes, without any modifications to the applications themselves. This level of flexibility enables businesses to adapt quickly to changing needs and optimize resource usage effectively.
  • 8
    Entrust Certificate Hub Reviews
    Manage your certificates by automating, controlling and finding them. Certificate Hub allows you to manage all your digital certificates from one portal. Certificate Hub manages all aspects of digital certificates, from discovery and audit to issuance or orchestration. Certificate Hub makes it easy and intuitive for your entire organization to manage certificates. Certificate Hub centralizes certificate lifecycle management across multiple CAs. This makes it easy to locate and control all digital certificates within your infrastructure. Certificate Hub scans your CA databases and networks for information about certificates. Your team is kept informed and accountable with automated notifications and reports. With a browser-based interface, you can find, control, and manage all aspects of your certificates across multiple CAs. Certificate Hub is container-based and can be used for commercial cloud hosting or on-premises.
  • 9
    Puppet Enterprise Reviews

    Puppet Enterprise

    Perforce

    $120 per month
    Puppet Enterprise is an enterprise-grade infrastructure automation and configuration management solution built to help organizations simplify IT operations, improve security, and manage large-scale infrastructure environments efficiently. The platform automates infrastructure deployment, patch management, compliance enforcement, vulnerability remediation, and operational workflows across hybrid, cloud, on-premise, and edge environments. Puppet Enterprise enables centralized control over Linux servers, Windows systems, network devices, and edge infrastructure through one unified automation platform designed to reduce operational complexity and manual intervention. The platform includes AI-powered infrastructure insights that use natural language interfaces to help teams analyze infrastructure data, accelerate troubleshooting, and make faster operational decisions. Puppet Enterprise also provides event-driven automation that automatically responds to configuration drift, security threats, system failures, and compliance violations in real time. Security and compliance capabilities allow organizations to continuously enforce CIS and DISA STIG policies, automate audit reporting, and maintain secure system configurations across distributed environments. The platform offers advanced features such as patch orchestration, impact analysis, self-service automation catalogs, observability integrations, and agentless device management for network and edge systems. Puppet Enterprise integrates with major DevOps, monitoring, and cloud platforms including AWS, Azure, Google Cloud, Kubernetes, Jenkins, Grafana, Splunk, Datadog, GitLab, ServiceNow, and Prometheus.
  • 10
    Terraform Reviews
    Terraform is a powerful open-source tool for managing infrastructure as code, offering a consistent command-line interface to interact with numerous cloud services. By translating cloud APIs into declarative configuration files, Terraform enables users to define their infrastructure requirements clearly. Infrastructure can be written using these configuration files, leveraging the HashiCorp Configuration Language (HCL), which provides a straightforward way to describe resources through blocks, arguments, and expressions. Before making any changes to your infrastructure, executing the command terraform plan allows you to verify that the proposed execution plan aligns with your expectations. To implement the desired configuration, you can use terraform apply, which facilitates the application of changes across a wide range of cloud providers. Furthermore, Terraform empowers users to manage the entire lifecycle of their infrastructure — from creating new resources to overseeing existing ones and eventually removing those that are no longer necessary, ensuring efficient management of cloud environments. This holistic approach to infrastructure management helps streamline operations and reduces the risk of errors during deployment.
  • 11
    1Kosmos Reviews
    1Kosmos offers a password-free method for employees, clients, and the general public to engage securely with digital services. Through the integration of identity verification and robust authentication, the BlockID platform establishes a decentralized digital identity that effectively mitigates risks such as identity theft, account compromise, and fraudulent activities, all while ensuring seamless user interactions. Notably, BlockID stands out as the sole platform certified by NIST, FIDO2, and iBeta biometrics, conducting millions of authentication processes each day for major banks, telecommunications companies, and healthcare providers globally. This innovative approach not only enhances security but also significantly improves the overall user experience.
  • 12
    Sendmail Reviews
    The Sentrion platform from sendmail is crafted for intricate and expansive environments, yet we also offer a portion of this solution as open-source. While Sentrion may not suit everyone’s needs, it is an excellent choice for those employing open-source email systems within large and complex infrastructures, as it can support your messaging strategy for the long term, encompassing aspects like virtualization, consolidation, and cloud migration. The Domain Keys Identified Mail (DKIM) standard plays a pivotal role in email security by allowing senders to digitally sign their messages, enabling recipients to verify that these messages are genuine and have not been tampered with. This sender authentication process ensures that recipients can trace the origin of an email back to the sender's domain, providing assurance regarding the integrity of the message content. Utilizing cryptography, DKIM offers a widely accepted solution for reducing email fraud, thereby safeguarding an organization's brand and reputation while keeping implementation costs manageable. With the increasing prevalence of email threats, adopting DKIM can be a crucial step in fortifying your email security framework.
  • 13
    Entrust Identity Enterprise Reviews
    Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one.
  • 14
    Aquera Reviews
    The Aquera Identity Integration Platform as a Service is a cloud-driven solution that offers SCIM gateway capabilities for account provisioning and aggregation, orchestration services to ensure user and password sync, and workflow tools for managing disconnected applications effectively. Additionally, it provides password rotation gateway functionalities tailored for privileged account oversight, along with a comprehensive catalog of pre-built connectors designed for both cloud-based and on-premises applications. These connectors, whether ready-made or custom-built, allow seamless integration from identity management systems, privileged account management tools, or HR applications to various cloud or on-premises environments, databases, directories, devices, or B2B platforms. Notably, the integration process demands no coding expertise and can be executed in just a few minutes. With its versatile gateway services and a wide range of ready-to-use connectors, the platform facilitates user provisioning and deprovisioning, HR application onboarding, account aggregation, and various file operations, making it an invaluable tool for organizations. Moreover, the ease of deployment and user-centric design enhances its appeal, enabling businesses to streamline their identity management processes efficiently.
  • 15
    SQLXPress Reviews
    Contemporary graphical solutions are available for the management of NonStop SQL and Enscribe databases. SQLXPress serves as a user-friendly Windows-based graphical interface that allows for the thorough oversight of HPE NonStop SQL databases. With its modular structure, it can be tailored to accommodate either SQL/MX, SQL/MP, or both types of databases. This tool is indispensable for effectively managing extensive and intricate database environments. Acting as a vital complement to NonStop SQL, SQLXPress encompasses an integrated suite of tools crafted for compatibility with SQL/MX version 2.3 or higher and SQL/MP version 350. Its modular framework equips database administrators, software developers, quality assurance analysts, and technical support teams with specialized tools. Additionally, SQLXPress features a SQL "whiteboard" that enhances user experience through syntax highlighting, code completion, command history, and other functionalities. Users can import and export data seamlessly between NonStop SQL and various other database systems, while also maintaining oversight of plans for programs, modules, and independent queries. Overall, SQLXPress streamlines the management process, providing robust solutions for complex database tasks.
  • 16
    Datacard Secura Reviews
    Datacard®, Secura™, identity and credential management software revolutionizes the process of issuing and managing highly-secure passports and national IDs, PIV card, and other government credentials. It streamlines the entire process from enrollment, identity verification, approval of applications, document issuance and post-issuance management. You can choose from high volume, desktop, or mobile issuance options. Allows for updates, cancellation, and other post-issuance processes. Pre-configured workflows are faster than custom development. Allows biometric and biographic capture as well as breeder document processing. Interfaces with external sources to verify identities and manage them. Includes business rules, profiles, data preparation capabilities, and other information. The risk of overruns in time and cost is greatly reduced by the absence of customization. Integration with other components of your credential ecosystem is easier when you use a standards-based architecture.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB