Best IT Security Software for AWS Secrets Manager

Find and compare the best IT Security software for AWS Secrets Manager in 2024

Use the comparison tool below to compare the top IT Security software for AWS Secrets Manager on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    StrongDM Reviews

    StrongDM

    StrongDM

    $70/user/month
    82 Ratings
    See Software
    Learn More
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 2
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 3
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 4
    AWS Certificate Manager Reviews
    AWS Certificate Manager allows you to easily create, manage, and deploy private and public Secure Sockets Layer/Transport Layer Security certificates (SSL/TLS), for use with AWS services as well as your internal resources. SSL/TLS certificates can be used to protect network communications and establish the identity websites on the Internet. AWS Certificate Manager automates the tedious manual process of purchasing, uploading and renewing SSL/TLS certificate.
  • 5
    Procyon Reviews
    Secure, frictionless access to cloud infrastructure. Access to major cloud platforms and thousands more cloud resources is possible with password-free access. We integrate seamlessly with AWS and GCP, Azure, as well as other cloud-native tools. Just-in-time access for developers will end overprivileged access. DevOps users have the ability to request access to cloud resources with "just enough privileges" to gain time-bound access. Eliminate productivity bottlenecks caused by a central administrator. You can create approval policies that are based on many factors. View a list of unaccessed and granted resources. Stop worrying about credential theft and credential sprawl. Developers can gain passwordless access to cloud resources with Trusted Platform ModuleTM (TPM) technology. Use our free assessment tool to discover potential vulnerabilities and learn how Procyon can solve the problem within hours. Use TPM to identify users and devices.
  • 6
    Clutch Reviews
    Clutch addresses the growing challenge of non-human security in modern enterprises. As digital infrastructures grow and become more complex the management and security non-human identity, from API keys and secret to tokens and services accounts, has emerged as an important yet often overlooked aspect of cybersecurity. Clutch has developed an enterprise platform to manage and protect these identities. Our solution is designed for enterprises to strengthen their digital backbone, ensuring a safe, resilient and trustworthy environment. The number of digital identities is growing at an astonishing rate of 45 to 1 compared to human ones. Has extensive access and critical privileges, which are essential for mission-critical automated process. Lacks inherent security measures such as MFA or conditional access policies.
  • Previous
  • You're on page 1
  • Next