Best InPrivy Alternatives in 2024

Find the top alternatives to InPrivy currently available. Compare ratings, reviews, pricing, and features of InPrivy alternatives in 2024. Slashdot lists the best InPrivy alternatives on the market that offer competing products that are similar to InPrivy. Sort through InPrivy alternatives below to make the best choice for your needs

  • 1
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 2
    1Password Reviews
    Top Pick
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 3
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 4
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 5
    Yandex Lockbox Reviews

    Yandex Lockbox

    Yandex

    $0.0277 per 10000 operations
    Create secrets using the API or the management console. Your secrets are stored safely in one place and can be easily integrated with cloud services. They are also accessible by external systems via the gRPC API or REST API. Yandex Key Management Service can be used to encrypt your secrets. Secrets are only kept in encrypted form. You can select from pre-configured roles to gain granular access. Set access permissions for reading or managing your secret or its metadata. Create a secret and select a Key Management Service key to securely store your login and password pairs and other sensitive data. A secret can contain any confidential information you have, such as a login-password pair. A login-password combination, server certificate keys or cloud service account key. The service can store multiple versions of data for each secret. This data is stored in an encrypted form by the service. All secrets are replicated across three availability zones.
  • 6
    Hemmelig.app Reviews
    Paste a password, confidential message, or private data. Secure, confidential, and encrypted sensitive data is what you want. By default, the secret link is only available for a single use. Hemmelig, [he`m:(@)li], means secret in Norwegian.
  • 7
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 8
    Password Pusher Reviews
    Password Pusher allows you to securely share passwords and sensitive information. Password Pusher allows you to create a unique URL that expires after a specified time period or after the URL has been accessed for a specific number of times. This ensures that your information is private and secure. Individuals and organizations use it to share login credentials with clients, partners, or colleagues. Password Pusher allows you to securely share passwords with others without having to use email or any other less secure methods of communication.
  • 9
    SecretHub Reviews

    SecretHub

    SecretHub

    $99 per month
    Unified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team.
  • 10
    Knox Reviews
    Knox is a secret management system. Knox allows you to store and rotate secrets, keys, passwords, and other information. Pinterest has many keys and secrets that can be used to sign cookies, encrypt data, protect our network via TLS, access our AWS machines, communicate with third parties, and many other things. Rotating (or changing) keys can be difficult if they are compromised. This usually involves a deploy and most likely a code change. Pinterest keys/secrets were stored in git repositories. These keys were stored in git repositories and copied all over the company's infrastructure. They were also present on many employees' laptops. It was impossible to audit who had access to the keys and who did not. These problems were solved by Knox. Developers can access/use confidential keys and credentials with ease. Confidentiality of secrets, keys and credentials. In the event of compromise, provide mechanisms for key rotation.
  • 11
    Strongbox Reviews

    Strongbox

    Strongbox

    $2.49 per month
    Strongbox offers best-in-class secure password management to help you keep your data private. You are protected from digital attacks using industry-standard formats, military-grade cryptography, and recognized best practices. Strongbox provides a beautiful native experience for iPhones, iPads, and Macs. The ultimate KeePass iOS password manager. Strongbox is an iOS and MacOS native app. It looks and feels exactly like an App should. Strongbox is natively designed with Apple's human interface guidelines and standard UI controls, colours, and integrations in mind. AutoFill integration makes it easy to use Safari or other Apps to fill out a password. Simply tap the Strongbox suggestion to the right of your keyboard and authenticate. Face ID can be used to unlock your database automatically.
  • 12
    Entropy Keycrypt Reviews
    Entropy offers a seamless, secure transition from your trusted circle to your digital assets in the event of an emergency. Security that is User-Friendly Entropy allows you to securely partition your important information into discrete share, which each do not reveal anything about your secret without the other. Distribute them to a small group of trusted people who can store them offline. Long-Term Resilience Entropy's robust security features include 256-bit encryption. This allows for decentralized, durable offline storage that protects your data against both online and offline threats.
  • 13
    Yandex Key Management Service Reviews
    Protect your secrets, sensitive data, and personal information in the cloud with keys. Create and delete key, set access policies, perform rotation via the Management Console, CLI or API. Yandex KMS supports both symmetric and asymetric cryptography. Use the REST API or RPC to encrypt, decrypt, and sign data using eSignature schemes. Yandex KMS manages access to encrypted data while you control the physical security and reliability of keys. Hardware Security Modules are available. SDKs in Java or Go can be used to encrypt small amounts. The service integrates popular encryption libraries such as the AWS EncryptionSDK and Google Tink to encrypt large amounts of data. Yandex Lockbox integration allows you to encrypt secret data with your own keys. Managed Service for Kubernetes also allows you to protect secrets and data using encryption keys.
  • 14
    AWS Secrets Manager Reviews
    AWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments.
  • 15
    Password.link Reviews

    Password.link

    Password.link

    €8.99 per month
    The link can only once be opened. This means that it cannot be opened more than once. After it has been viewed, the encrypted secret is deleted automatically from our database. It is impossible to view it again. Leaving secrets in plain text exposes them even to threats long after the message is gone. A one-time link is a way to ensure that there are no valid credentials in email inboxes, or archived instant messages. The link contains half of the encryption key and is never shared with anyone. Without the original link, it is impossible to view the secret. You can use our service to create a unique link to the credentials. This will ensure that no one sees them except the recipient. You can also set up notifications to be sent via various channels so that you know when credentials have been viewed and by whom.
  • 16
    Bravura Safe Reviews
    Bravura Safe is a zero knowledge secret and passwords manager. It centrally manages and secures decentralized passwords and secrets, so employees don't have too. It can be used in conjunction with core password management solutions already in use by organizations. Bravura Safe draws on two decades of Bravura Security enterprise cybersecurity solutions. Employees can securely send time-bound passwords to new accounts, encryption keys to files, or entire files to Bravura Secure. They don't have to be leaked or intercepted and only need one password to their BravuraSafe. Cybersecurity leaders should be concerned about the recent rise in threats of organizational insiders being paid for their assistance with cyberattacks. This is combined with a notoriously bad secret and password hygiene at an individuals level. IT teams have been focusing on strong SSO, password management and identity, but the rise of work-from-home IT has led to shadow IT.
  • 17
    Pulumi Reviews
    Modern Infrastructure as Code. Use familiar programming languages and tools to create, deploy, manage, and monitor infrastructure in any cloud. One workflow for many clouds. On any cloud, you can use the same language, tools, or workflow. Collaborate. Harmonize your engineering practices among developers and operators. Easy continuous delivery. You can deploy from the CLI or integrate with your favorite CI/CD software. All changes are reviewed before they are made. Reduce complexity. Get visibility across all your environments. Audit and secure. Know who made changes to what, when and why. With your identity provider of choice, enforce deployment policies. Secrets management. Secure secrets with an easy-to-use encrypted configuration Familiar programming languages. You can define infrastructure in JavaScript or TypeScript, Python, Go or any other.NET language including C#, F# and VB. Use your favorite tools. Use familiar IDEs and test frameworks. Reuse and share. Codify best practices.
  • 18
    Azure Key Vault Reviews
    Key Vault helps you to improve data protection and compliance To protect cloud data, secure key management is crucial. Azure Key Vault can encrypt keys and small secrets, such as passwords, that are stored in hardware security module (HSMs). You can import or generate keys in HSMs for additional security. Microsoft processes your keys using FIPS validated HSMs (hardware, firmware, and hardware) - FIPS 140-2 level 2 for vaults, and FIPS 140-2 level 3 for HSM pools. Microsoft can't see your keys or extract them with Key Vault. You can monitor and audit key usage with Azure logging-pipe logs to Azure HDInsight, or your security information management (SIEM), for more analysis and threat detection.
  • 19
    CyberArk Conjur Reviews
    Securely authenticate, control, and audit non-human access across tools and applications. Secrets allow access to tools, critical infrastructure, and other sensitive data. Conjur protects these secrets by tightly controlling them with granular Role-Based Access Control. Conjur authenticates an application that requests access to a resource. It then checks the security policy against the authorization and distributes the secret securely. Conjur's security policy is code. Security rules are written in.yml format, checked into source control and loaded onto Conjur. Security policy is treated as any other source control asset. This adds transparency and collaboration to the organization’s security requirements.
  • 20
    Onboardbase Reviews
    Onboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.
  • 21
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • 22
    Confidant Reviews
    Lyft's Confidant is an open-source secret management service that allows users to store and access secrets in a secure manner. Confidant solves both the authentication chicken-and-egg problem by using AWS KMS, IAM to allow IAM role to generate secure authentication tokens which can be verified by Confidant. Confidant also manages KMS grant for your IAM role, which allows IAM roles to generate tokens that are used for service-to–service authentication or to transmit encrypted messages between services. Confidant stores secrets using DynamoDB in an append-only manner. It generates a unique KMS key for each revision of every secret by using Fernet symmetric authenticated encryption. Confidant offers an AngularJS web interface which allows end-users easy access to secrets, the mappings secret to services, and the history of any changes.
  • 23
    Fortanix Data Security Manager Reviews
    A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing.
  • 24
    Infisical Reviews

    Infisical

    Infisical

    $6 per month
    Compare secrets between environments to see what is different or missing. Set personal values to secrets, either for sensitive secrets or during local development. You can easily inherit other secrets in order to establish a single truth. Infisical’s continuous monitoring and pre commit checks can be used to automatically identify and prevent leaks of secrets into git. Support for over 140 secret types.
  • 25
    Drone Reviews
    Configuration as code. Pipelines are created with a simple, readable file that is then committed to your git repository. Each step of a pipeline is executed in a Docker container, which is automatically downloaded at runtime. Any source code manager. Drone.io seamlessly integrates with multiple source code management system, including Bitbucket and GitHubEnterprise. Any platform. Drone natively supports multiple operating system and architectures, including Linux x64/ARM/ARM64/Windows x64. Any language. Drone can communicate with any language, database, or service that runs within a Docker container. You can choose from thousands of Docker images, or create your own. Make and share plugins. Drone uses containers to drop preconfigured steps into your pipeline. You can choose from hundreds of pre-made plugins or create your own. Drone allows for advanced customization. You can create custom access controls, approve workflows, secret management, yaml syntax extension, and other features using drone.
  • 26
    Keywhiz Reviews
    Keywhiz is a system that manages and distributes secrets. It can be used in conjunction with service-oriented architecture (SOA). Here's a brief overview in presentation format. Common practices include placing secrets in config files alongside code and copying files to servers outside-of-band. The former is more likely to be leaked, while the latter is more difficult to track. Keywhiz makes it easier and safer to manage secrets. Keywhiz servers in clusters centrally store secret information encrypted in a database. To retrieve secrets that they have access to, clients use mutually authenticated TLS(mTLS). Authenticated users administer Keywhiz via CLI. Keywhiz offers automation APIs that allow for workflows. Every organization has services and systems that require secrets. Secrets such as API tokens, GPG keys and TLS certificates/keys. Keywhiz is reliable and can be used in production. However, API backward compatibility may be broken by occasional changes.
  • 27
    iSafeSend Reviews
    iSafeSend allows you to securely send sensitive information via email. iSafeSend creates a unique link that you can use to access your confidential or sensitive information. This unique link is only available for a short time. Once it expires, it is deleted and cannot be accessed again. iSafeSend allows multiple unique links to be sent in separate emails. Using iSafeSend, users can create shareable links which, when clicked on, allow recipients to access the sensitive data you are sharing. This data can only once be viewed and it is deleted after that. These links cannot be viewed more than once. Therefore, recipients should not forward them to others. You can specify the number days before the links expire, and the number you wish to create. Each link generated can only be viewed once.
  • 28
    Delinea Secret Server Reviews
    Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials.
  • 29
    senhasegura Reviews
    The Security department of any organization must control access to privileged accounts. This is a vector of attack in almost every invasion. It is therefore not surprising that standards like PCI DSS and ISO 27001, HIPAA and NIST, GDPR and SOX have specific requirements and controls for user accounts. PCI DSS requires companies to implement controls that assign an individual identity to every person who has access to a computer. They also need to monitor customer payment data and network resources. senhasegura improves internal controls and reports requirements for SOX compliance. It goes beyond following the rules to implement an "inside out" security approach to become part your organization's DNA. Using senhasegura, companies can implement all controls in ISO 27001 relating to the security of privileged account accounts.
  • 30
    Entro Reviews
    Non-Human Identity & Secrets Security Platform. Entro is a pioneer in nonhuman identity management. It allows organizations to use nonhuman identities and secrets securely, while automating the lifecycle of their creation to rotation. Cyber attacks based on secrets are becoming more destructive as R&D teams create more secrets and spread them across different vaults and repositories without any real secret management, monitoring or security oversight. Streamline your non-human lifecycle management. Entro allows security teams to manage and protect non-human identities through automated lifecycle management, seamless integration and a unified interface.
  • 31
    Bitwarden Reviews
    Top Pick
    With an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment.
  • 32
    Padloc Reviews

    Padloc

    Padloc

    $3.49 per month
    Not only are passwords sensitive information that we deal with in our digital lives, but so is secret notes and license keys. Padloc allows you to store any type of data, including credit card details, license keys, secret notes, license keys, and other sensitive documents. Your data is encrypted from the beginning to ensure that no one can read it. You can share your passwords with family, friends, or colleagues. No problem! Padloc makes it easy for you to share and manage sensitive data within your family, your business, or any other type of organization. Trust is built on transparency and openness. Padloc is being developed completely openly. The source code is available under an open-source license, so anyone can view it, give feedback, or even make contributions at any time.
  • 33
    Dust Reviews
    Dust gives you control over your digital life. Dust believes online life is real, so you only have to control what you know about yourself. Our users are safe--free from the worry of prying eyes and data mining, hackers, or paranoia that your words might come back to haunt. You have freedom for everything that is important to you. Dust is the best private messaging and texting application for everyday texting, sharing photos with family and friends, and exchanging sensitive information such credit cards, social security numbers and bank information, wire transfer instructions and passwords, and medical records. Dust conversations are highly encrypted and cannot be accessed by anyone, not even us. You can even delete messages from their phone in real time. Dust cannot recover any messages that have been deleted. Send secret messages.
  • 34
    east-tec InvisibleSecrets Reviews

    east-tec InvisibleSecrets

    East-Tec

    $39.95 one-time payment
    east-tec InvisibleSecrets, a revolutionary file encryption and steganography software, allows you to encrypt files and folder structures containing confidential data. It also gives you the ability to hide files making them invisible to anyone. Use east-tec InvisibleSecrets to encrypt and hide file contents. It is a complete privacy and encryption software solution. We will also discuss other useful features such as password manager, file shredder, and program lock. east-tec InvisibleSecrets, a file encryption program, helps you protect your confidential data from prying eyes and unwanted access. It encrypts file or folder structures on your computer. It features strong file encryption algorithms that provide privacy protection. Protect files and sensitive information by hiding them.
  • 35
    PassVult Reviews

    PassVult

    Kraljevic Technology

    PassVult is an intuitive password manager for iPhone. PassVult's main purpose is to give users back control of their password data. It does this by locating all data on an individual iDevice. This makes it possible to protect yourself from vendor breaches and other password managers. Securely store and manage sensitive questions and answers. Manage and store physical codes. Manage your credit cards. Randomly generate complex, secure passwords for your accounts. All this data is stored in an encrypted local database that is AES-encrypted. You can password protect all of these features with a master key. In app web browser. Touch ID and Face ID. All your secrets can be exported. PassVult is the best password storage app for people who value privacy and security. All your data is kept local to your device. We will never share any of your personal information over the internet or the cloud.
  • 36
    Peergos Reviews

    Peergos

    Peergos

    $6.77 pr montj
    Online security is more important than ever. Peergos allows you to store, share, and view your documents, photos, videos, music, and videos in a private and secure environment. Peergos protects your files using quantum-resistant end to end encryption. This ensures that all data about your files, and even who you share them with remains private. Our cryptographic capability architecture ensures that you only share with people you wish to. Peergos allows only friends to share. Peergos can create secret links to your files that you can send to family members and friends who are not yet Peergos users. Peergos gives you control over your identity and is independent from any server, domain or company. Your identity is not tied to any other data, such as your email address or phone number. You can log in to your account using any device and any Peergos server. All you need to log in is your username, and your password.
  • 37
    SEMYOU Password Reviews
    You can control what everyone sees and shares. You can also easily delegate management tasks. sem.Password saves everything, keeps it safe, signs you in to your favorite sites automatically with one click. To see how employees use sem.Password at workplace, get detailed usage reports. Don't forget your passwords. Your bank account routing number. Or your house's alarm code. They are all kept safe by sem.PASSWORD. Everything, from online accounts to social insurance numbers, can be stored. You can quickly find what you need on any device using tags and powerful search. Your data is secured behind your unique Master Password, which you only know. Your sensitive information is protected by strong AES256 encryption. Your data is encrypted every time you use sem.Password before it leaves your devices. Your Master Password protects your encryption keys, so only you can unlock them.
  • 38
    ShareSecret Reviews
    Auto-redaction of sensitive information, encryption data sharing, and self-destructing private conversations are all possible. You can share passwords, private keys and API tokens with complete peace of mind. All data stored in our short-term vault are encrypted at rest using AES256 encryption. Our system does not store keys. Once secrets expire, they are completely deleted from our system. There are no traceable items in our vault, logs or chat. ShareSecret will erase all data within 24 hours or up to 7 days. All data is encrypted at rest using industry-standard 256 bit AES encryption in our short term vault. API tokens, passwords, private keys and credit cards are all protected by our short-term vault. All data encrypted at rest. Securely share sensitive documents such as PDFs, zip files and powerpoint / keynote presentations. Slack's bot makes it easy for you to share sensitive data without compromising security.
  • 39
    Password Depot Reviews
    Our on-premises B2B solution "Password Depot Enterprise Server" offers straightforward implementation with no training required as the software is self-explanatory at a cost-effective price. Collaborate securely on sensitive data across your organization. Securely share passwords, documents, credit card details, and other confidential information with your team, whether across local networks or via the Internet. Your IT department will cherish the Enterprise Server. Password Depot the outstanding password manager made in Germany since 1998.
  • 40
    ginlo Reviews

    ginlo

    ginlo.net

    $3.00/year/user
    Ginlo makes it easier and safer to stay in touch with others. With clients, employees, patients, students, etc. Fully encrypted data security, GDPR compliant - even if your device gets lost or stolen. Central user management, stronger protection against malware. We have the right solution for you in ginlo Business or ginlo Private when it comes to protecting your privacy. You can stay connected while working on confidential documents, sharing them securely, and protecting them simultaneously. This is ginlo Business and ginlo data. You can now access everything you need from one source, whether it's secret planning documents, due diligence, or any other highly sensitive information. ginlo Business Messenger is the perfect solution for your church, school, medical practice, or childcare center. It enables you to bring together all your business communications in one place.
  • 41
    Proton Pass Reviews

    Proton Pass

    Proton AG

    $1.99 per user/per month
    Proton Pass protects your passwords and identities with end-to-end encryption. Proton Pass was developed by the same team that created Proton Mail - the world's largest encrypted mail service. Proton is recommended by the United Nations to share highly sensitive data. Our encryption is open-source and battle-tested. Proton Pass was the first password manager created by a security firm with a privacy-first approach. Join the millions who have already signed up to Proton in order to protect their data.
  • 42
    Locklizard Safeguard PDF Security Reviews
    Locklizard protects PDF files from piracy, leakage, and misuse. Unauthorized access to documents is prevented and only authorized users are allowed to use them. Stop the theft of confidential and sensitive information, intellectual properties, training courses, reports, ebooks, and other trade secrets. Securely share and sell documents, prevent data leakage, and enforce compliance. You can lock documents to devices and locations, dynamically add watermarks, control expiry, stop printing and copying, and revoke access at anytime. You can track how your documents are used. Locklizard employs strong encryption, DRM, and licensing controls that are US Gov strength to ensure that your documents remain fully secure regardless of where they are located.
  • 43
    C2 Password Reviews

    C2 Password

    Synology C2

    $4.99 per year
    Passwords and other sensitive data like addresses, banking information and passport details can be stored. Everything can be organized using tags, categories, and favorites. To simplify credential management across all devices, automatically generate and securely store passwords. C2 Password can generate complex combinations of letters and numbers for you, or you can check the strength of your passwords as they are being created. No matter what device you use, you should always have your credentials handy. You can add items to one device and have them accessible from anywhere using handy mobile apps, browser extensions, and the C2 Password website. You can easily share passwords and other items via email with family, friends, or colleagues. Items stored in each user’s vault are kept secret. Securely send files to others by requesting authentication from the receiver and adding text or image watermarks.
  • 44
    Conjurers Encrypter Reviews
    Conjurers Encrypter 4 (or simply CE 4) is a powerful, yet simple-to-use freeware file encryption utility. It can be used to quickly encrypt files and folders and protect your confidential and important data. Encryption refers to the process of encoding information so it cannot be accessed by others without the secret key. While encryption is used to protect sensitive documents and information, encryption can also be used to prevent people from viewing your personal data. It is possible to send important files over the internet after encrypting them. This eliminates the possibility of the contents being seen by anyone other than the recipient, even bypassing attacks such as Network Sniffing.
  • 45
    NHSmail Reviews
    NHSmail is our secure email service that has been approved by the Department of Health and Social Care to share patient identifiable and sensitive data. The national secure collaboration platform for social and health care is NHSmail. The service's capabilities will revolutionize the way you collaborate within your organization and with others. All emails sent to or from social care and health organizations must comply with the secure email standard DCB1596, so that confidential and sensitive information can be kept safe. NHS Digital uses NHSmail as its preferred email service. Access to the system can only be managed using account details. NHS Digital may send and receive confidential information as part of its activities. Register to your secure NHS email. NHSmail is a secure email system that can be used to share sensitive information. The data is kept for up to 180 days after the account is deleted.
  • 46
    qProtect Reviews
    qProtect™, which provides powerful data protection, is especially useful for sensitive assets that are located in uncontrolled environments. It provides a practical solution to protect critical mobile data. It offers the ability to automatically erase key information when recording data and "virtualzeroization", which protects confidential information from any source, now or in the future. Our product portfolio and strong technical partnerships provide broad security capabilities that will ensure the strongest security posture today and tomorrow. QuintessenceLabs quantum enabled solutions integrate with today’s encryption technologies. A centralized, vendor-neutral encryption key managing solution. This key management solution is designed to address the most difficult challenges in key management. Crypto agile can adapt to quantum-resistant algorithms. This protocol uses specialized hardware to share secret key information over an optical link.
  • 47
    Akeyless Vault Reviews
    Secure vaults allow you to automate and protect access to credentials, keys and tokens across your DevOps tools, Cloud platforms, and API-Keys using your Cloud platforms.
  • 48
    Obynt Reviews
    Obynt is a software to manage, store and protect sensitive data such as passwords, credit card numbers or asset information. Obynt uses encryption to protect sensitive data within client applications, and never reveals the encryption keys to the Database Engine (SQL Database) or SQL Server. Obynt allows for a separation between data owners and those who can view it. It also allows for data managers to have access but not those who control the data. The encrypted data is not accessible to anyone except the on-premise database administrators and other highly-privileged unauthorized users. Obynt uses MSSQL to store the Data centrally, for Single or Multiple-User.
  • 49
    Locker Password Manager Reviews
    Locker is more than just a password manager. Locker protects sensitive data, such as passwords and secret notes. It also secures payment cards, crypto backups, and identities. Locker can store sensitive data and log you in to your favorite sites. It also scans for data breaches. Locker also offers additional security features such as private email, built-in authentication ,... Each feature in Locker is built with privacy and transparency in mind to ensure maximum security. Locker believes that everyone deserves to have a seamless and secure internet experience. Locker will keep you safe online, whether you are tech-savvy or otherwise.
  • 50
    Zama Reviews
    Allowing healthcare providers to share confidential, secure data will improve patient care and maintain privacy. Facilitate secure financial analysis for fraud detection and risk management, while keeping client information encrypted. In the post-cookie age, create targeted advertising and campaign insights while ensuring user privacy with encrypted data analysis. Enable data sharing between agencies while maintaining confidentiality, improving efficiency and data security without revealing secrets. Allow users to create authentication applications without revealing their identities. Allow governments to create digital versions of their services, without having to rely on cloud providers.