Best Password Pusher Alternatives in 2024

Find the top alternatives to Password Pusher currently available. Compare ratings, reviews, pricing, and features of Password Pusher alternatives in 2024. Slashdot lists the best Password Pusher alternatives on the market that offer competing products that are similar to Password Pusher. Sort through Password Pusher alternatives below to make the best choice for your needs

  • 1
    1Password Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 2
    ManageEngine ADSelfService Plus Reviews
    See Software
    Learn More
    Compare Both
    Both IT teams and end users are afflicted by password reset tickets. IT teams will often push more urgent issues down the queue to ensure that users don't have their work put on hold while their passwords reset. Password reset tickets can be costly if they aren't addressed promptly. Nearly 30 percent of all help desk tickets were caused by forgotten passwords. It is not surprising that large companies have spent more than $1 million to resolve password-related help desk requests. It is a good habit to change passwords regularly, as it helps prevent cyberattacks caused by stolen credentials. Security experts recommend that administrators ensure that users change their passwords regularly and have password expiration policies in place.
  • 3
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 4
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 5
    Securden Password Vault Reviews
    Securden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS).
  • 6
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 7
    InPrivy Reviews

    InPrivy

    InPrivy

    €30 per year
    Share sensitive information easily with clients, co-workers and friends. Use InPrivy for sharing passwords and sensitive information in a safe way. Your confidential data will not be visible in chats or emails. It is important to keep your private data secure. This includes passwords, API keys and credit card information. Your data will be visible for a long period of time even if you send them via email or messengers. Use InPrivy to share your data in a secure manner. InPrivy is 100% German-made, with no ads and no excessive user tracking. We guarantee strong protection of your sensitive data. You can access the site from any device, without needing to install any apps. Only you know the link to the secret information that you created. It is your responsibility to give it to the person who needs it. These links are protected with SSL encryption and can only be used once. Strong AES256 encryption protects the secret information.
  • 8
    Hemmelig.app Reviews
    Paste a password, confidential message, or private data. Secure, confidential, and encrypted sensitive data is what you want. By default, the secret link is only available for a single use. Hemmelig, [he`m:(@)li], means secret in Norwegian.
  • 9
    Yandex Lockbox Reviews

    Yandex Lockbox

    Yandex

    $0.0277 per 10000 operations
    Create secrets using the API or the management console. Your secrets are stored safely in one place and can be easily integrated with cloud services. They are also accessible by external systems via the gRPC API or REST API. Yandex Key Management Service can be used to encrypt your secrets. Secrets are only kept in encrypted form. You can select from pre-configured roles to gain granular access. Set access permissions for reading or managing your secret or its metadata. Create a secret and select a Key Management Service key to securely store your login and password pairs and other sensitive data. A secret can contain any confidential information you have, such as a login-password pair. A login-password combination, server certificate keys or cloud service account key. The service can store multiple versions of data for each secret. This data is stored in an encrypted form by the service. All secrets are replicated across three availability zones.
  • 10
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 11
    AWS Secrets Manager Reviews
    AWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments.
  • 12
    SecretHub Reviews

    SecretHub

    SecretHub

    $99 per month
    Unified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team.
  • 13
    Bravura Safe Reviews
    Bravura Safe is a zero knowledge secret and passwords manager. It centrally manages and secures decentralized passwords and secrets, so employees don't have too. It can be used in conjunction with core password management solutions already in use by organizations. Bravura Safe draws on two decades of Bravura Security enterprise cybersecurity solutions. Employees can securely send time-bound passwords to new accounts, encryption keys to files, or entire files to Bravura Secure. They don't have to be leaked or intercepted and only need one password to their BravuraSafe. Cybersecurity leaders should be concerned about the recent rise in threats of organizational insiders being paid for their assistance with cyberattacks. This is combined with a notoriously bad secret and password hygiene at an individuals level. IT teams have been focusing on strong SSO, password management and identity, but the rise of work-from-home IT has led to shadow IT.
  • 14
    Entropy Keycrypt Reviews
    Entropy offers a seamless, secure transition from your trusted circle to your digital assets in the event of an emergency. Security that is User-Friendly Entropy allows you to securely partition your important information into discrete share, which each do not reveal anything about your secret without the other. Distribute them to a small group of trusted people who can store them offline. Long-Term Resilience Entropy's robust security features include 256-bit encryption. This allows for decentralized, durable offline storage that protects your data against both online and offline threats.
  • 15
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • 16
    Strongbox Reviews

    Strongbox

    Strongbox

    $2.49 per month
    Strongbox offers best-in-class secure password management to help you keep your data private. You are protected from digital attacks using industry-standard formats, military-grade cryptography, and recognized best practices. Strongbox provides a beautiful native experience for iPhones, iPads, and Macs. The ultimate KeePass iOS password manager. Strongbox is an iOS and MacOS native app. It looks and feels exactly like an App should. Strongbox is natively designed with Apple's human interface guidelines and standard UI controls, colours, and integrations in mind. AutoFill integration makes it easy to use Safari or other Apps to fill out a password. Simply tap the Strongbox suggestion to the right of your keyboard and authenticate. Face ID can be used to unlock your database automatically.
  • 17
    Yandex Key Management Service Reviews
    Protect your secrets, sensitive data, and personal information in the cloud with keys. Create and delete key, set access policies, perform rotation via the Management Console, CLI or API. Yandex KMS supports both symmetric and asymetric cryptography. Use the REST API or RPC to encrypt, decrypt, and sign data using eSignature schemes. Yandex KMS manages access to encrypted data while you control the physical security and reliability of keys. Hardware Security Modules are available. SDKs in Java or Go can be used to encrypt small amounts. The service integrates popular encryption libraries such as the AWS EncryptionSDK and Google Tink to encrypt large amounts of data. Yandex Lockbox integration allows you to encrypt secret data with your own keys. Managed Service for Kubernetes also allows you to protect secrets and data using encryption keys.
  • 18
    Password.link Reviews

    Password.link

    Password.link

    €8.99 per month
    The link can only once be opened. This means that it cannot be opened more than once. After it has been viewed, the encrypted secret is deleted automatically from our database. It is impossible to view it again. Leaving secrets in plain text exposes them even to threats long after the message is gone. A one-time link is a way to ensure that there are no valid credentials in email inboxes, or archived instant messages. The link contains half of the encryption key and is never shared with anyone. Without the original link, it is impossible to view the secret. You can use our service to create a unique link to the credentials. This will ensure that no one sees them except the recipient. You can also set up notifications to be sent via various channels so that you know when credentials have been viewed and by whom.
  • 19
    Knox Reviews
    Knox is a secret management system. Knox allows you to store and rotate secrets, keys, passwords, and other information. Pinterest has many keys and secrets that can be used to sign cookies, encrypt data, protect our network via TLS, access our AWS machines, communicate with third parties, and many other things. Rotating (or changing) keys can be difficult if they are compromised. This usually involves a deploy and most likely a code change. Pinterest keys/secrets were stored in git repositories. These keys were stored in git repositories and copied all over the company's infrastructure. They were also present on many employees' laptops. It was impossible to audit who had access to the keys and who did not. These problems were solved by Knox. Developers can access/use confidential keys and credentials with ease. Confidentiality of secrets, keys and credentials. In the event of compromise, provide mechanisms for key rotation.
  • 20
    Delinea Secret Server Reviews
    Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials.
  • 21
    CyberArk Conjur Reviews
    Securely authenticate, control, and audit non-human access across tools and applications. Secrets allow access to tools, critical infrastructure, and other sensitive data. Conjur protects these secrets by tightly controlling them with granular Role-Based Access Control. Conjur authenticates an application that requests access to a resource. It then checks the security policy against the authorization and distributes the secret securely. Conjur's security policy is code. Security rules are written in.yml format, checked into source control and loaded onto Conjur. Security policy is treated as any other source control asset. This adds transparency and collaboration to the organization’s security requirements.
  • 22
    Azure Key Vault Reviews
    Key Vault helps you to improve data protection and compliance To protect cloud data, secure key management is crucial. Azure Key Vault can encrypt keys and small secrets, such as passwords, that are stored in hardware security module (HSMs). You can import or generate keys in HSMs for additional security. Microsoft processes your keys using FIPS validated HSMs (hardware, firmware, and hardware) - FIPS 140-2 level 2 for vaults, and FIPS 140-2 level 3 for HSM pools. Microsoft can't see your keys or extract them with Key Vault. You can monitor and audit key usage with Azure logging-pipe logs to Azure HDInsight, or your security information management (SIEM), for more analysis and threat detection.
  • 23
    Infisical Reviews

    Infisical

    Infisical

    $6 per month
    Compare secrets between environments to see what is different or missing. Set personal values to secrets, either for sensitive secrets or during local development. You can easily inherit other secrets in order to establish a single truth. Infisical’s continuous monitoring and pre commit checks can be used to automatically identify and prevent leaks of secrets into git. Support for over 140 secret types.
  • 24
    Akeyless Vault Reviews
    Secure vaults allow you to automate and protect access to credentials, keys and tokens across your DevOps tools, Cloud platforms, and API-Keys using your Cloud platforms.
  • 25
    Keywhiz Reviews
    Keywhiz is a system that manages and distributes secrets. It can be used in conjunction with service-oriented architecture (SOA). Here's a brief overview in presentation format. Common practices include placing secrets in config files alongside code and copying files to servers outside-of-band. The former is more likely to be leaked, while the latter is more difficult to track. Keywhiz makes it easier and safer to manage secrets. Keywhiz servers in clusters centrally store secret information encrypted in a database. To retrieve secrets that they have access to, clients use mutually authenticated TLS(mTLS). Authenticated users administer Keywhiz via CLI. Keywhiz offers automation APIs that allow for workflows. Every organization has services and systems that require secrets. Secrets such as API tokens, GPG keys and TLS certificates/keys. Keywhiz is reliable and can be used in production. However, API backward compatibility may be broken by occasional changes.
  • 26
    Fortanix Data Security Manager Reviews
    A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing.
  • 27
    Pulumi Reviews
    Modern Infrastructure as Code. Use familiar programming languages and tools to create, deploy, manage, and monitor infrastructure in any cloud. One workflow for many clouds. On any cloud, you can use the same language, tools, or workflow. Collaborate. Harmonize your engineering practices among developers and operators. Easy continuous delivery. You can deploy from the CLI or integrate with your favorite CI/CD software. All changes are reviewed before they are made. Reduce complexity. Get visibility across all your environments. Audit and secure. Know who made changes to what, when and why. With your identity provider of choice, enforce deployment policies. Secrets management. Secure secrets with an easy-to-use encrypted configuration Familiar programming languages. You can define infrastructure in JavaScript or TypeScript, Python, Go or any other.NET language including C#, F# and VB. Use your favorite tools. Use familiar IDEs and test frameworks. Reuse and share. Codify best practices.
  • 28
    Onboardbase Reviews
    Onboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.
  • 29
    senhasegura Reviews
    The Security department of any organization must control access to privileged accounts. This is a vector of attack in almost every invasion. It is therefore not surprising that standards like PCI DSS and ISO 27001, HIPAA and NIST, GDPR and SOX have specific requirements and controls for user accounts. PCI DSS requires companies to implement controls that assign an individual identity to every person who has access to a computer. They also need to monitor customer payment data and network resources. senhasegura improves internal controls and reports requirements for SOX compliance. It goes beyond following the rules to implement an "inside out" security approach to become part your organization's DNA. Using senhasegura, companies can implement all controls in ISO 27001 relating to the security of privileged account accounts.
  • 30
    Entro Reviews
    Non-Human Identity & Secrets Security Platform. Entro is a pioneer in nonhuman identity management. It allows organizations to use nonhuman identities and secrets securely, while automating the lifecycle of their creation to rotation. Cyber attacks based on secrets are becoming more destructive as R&D teams create more secrets and spread them across different vaults and repositories without any real secret management, monitoring or security oversight. Streamline your non-human lifecycle management. Entro allows security teams to manage and protect non-human identities through automated lifecycle management, seamless integration and a unified interface.
  • 31
    Drone Reviews
    Configuration as code. Pipelines are created with a simple, readable file that is then committed to your git repository. Each step of a pipeline is executed in a Docker container, which is automatically downloaded at runtime. Any source code manager. Drone.io seamlessly integrates with multiple source code management system, including Bitbucket and GitHubEnterprise. Any platform. Drone natively supports multiple operating system and architectures, including Linux x64/ARM/ARM64/Windows x64. Any language. Drone can communicate with any language, database, or service that runs within a Docker container. You can choose from thousands of Docker images, or create your own. Make and share plugins. Drone uses containers to drop preconfigured steps into your pipeline. You can choose from hundreds of pre-made plugins or create your own. Drone allows for advanced customization. You can create custom access controls, approve workflows, secret management, yaml syntax extension, and other features using drone.
  • 32
    Confidant Reviews
    Lyft's Confidant is an open-source secret management service that allows users to store and access secrets in a secure manner. Confidant solves both the authentication chicken-and-egg problem by using AWS KMS, IAM to allow IAM role to generate secure authentication tokens which can be verified by Confidant. Confidant also manages KMS grant for your IAM role, which allows IAM roles to generate tokens that are used for service-to–service authentication or to transmit encrypted messages between services. Confidant stores secrets using DynamoDB in an append-only manner. It generates a unique KMS key for each revision of every secret by using Fernet symmetric authenticated encryption. Confidant offers an AngularJS web interface which allows end-users easy access to secrets, the mappings secret to services, and the history of any changes.
  • 33
    C2 Password Reviews

    C2 Password

    Synology C2

    $4.99 per year
    Passwords and other sensitive data like addresses, banking information and passport details can be stored. Everything can be organized using tags, categories, and favorites. To simplify credential management across all devices, automatically generate and securely store passwords. C2 Password can generate complex combinations of letters and numbers for you, or you can check the strength of your passwords as they are being created. No matter what device you use, you should always have your credentials handy. You can add items to one device and have them accessible from anywhere using handy mobile apps, browser extensions, and the C2 Password website. You can easily share passwords and other items via email with family, friends, or colleagues. Items stored in each user’s vault are kept secret. Securely send files to others by requesting authentication from the receiver and adding text or image watermarks.
  • 34
    Bitwarden Reviews
    Top Pick
    With an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment.
  • 35
    LastPass Reviews
    Top Pick

    LastPass

    LastPass

    $4 per user per month
    32 Ratings
    LastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere.
  • 36
    Passpack Reviews
    Passpack offers the tools that individuals and teams need to securely organize, collaborate, and store passwords. It uses strong encryption and administrative controls. Passpack allows you to securely store and organize all your passwords in one place. Passpack is essential if you use the internet. Password Management isn't just for power users. You work hard for your family. You keep track of your bank accounts and email accounts. You pay your bills, insurance, and taxes online. Passpack's secure sharing function allows you to securely share your login credentials and other sensitive information with your family. If you're like most people, you need to work. Your employer may have several passwords, PINS, and security codes that you need to remember. Passpack can securely store your work passwords and personal data, and help you stay organized.
  • 37
    ShareSecret Reviews
    Auto-redaction of sensitive information, encryption data sharing, and self-destructing private conversations are all possible. You can share passwords, private keys and API tokens with complete peace of mind. All data stored in our short-term vault are encrypted at rest using AES256 encryption. Our system does not store keys. Once secrets expire, they are completely deleted from our system. There are no traceable items in our vault, logs or chat. ShareSecret will erase all data within 24 hours or up to 7 days. All data is encrypted at rest using industry-standard 256 bit AES encryption in our short term vault. API tokens, passwords, private keys and credit cards are all protected by our short-term vault. All data encrypted at rest. Securely share sensitive documents such as PDFs, zip files and powerpoint / keynote presentations. Slack's bot makes it easy for you to share sensitive data without compromising security.
  • 38
    Tenorshare 4uKey Reviews
    You can access your iPhone/iPad Wi-Fi passwords from PC/Mac (iPhone 13, iOS/iPadOS 15.3 and included). Import passwords to iPhone/iPad from Win & Mac (new). Recover passwords for apps and websites that you have already saved. View and scan mail accounts, credit card information. Show Apple ID Account on your device. Transfer passwords to an iOS password manager app such as 1Password. 4uKey Password Manager makes it easy to view, export, view, recover, view, and manage all your passwords for iPhone and iPad. This tool is intended to assist those who have lost Wi-Fi passwords or other passwords on iPhones. Commercial use is prohibited. Access to any credentials or individual data is not possible. 4uKey Password Manager is able to quickly locate your iPhone or iPad screen time passcode and restore it from any iDevice. You can save your current and past Apple IDs so you can access them at any time.
  • 39
    Resiliant Reviews
    Blockchain and AI technology allows for a password-less, secure ID authentication that is user-centric, affordable, and secure. Control your digital risks and protect data by blocking unwanted users and devices. Onboarding once for multiple devices, servers, networks, and web sites. No more 2FA codes or matching images that do not protect users or enterprises against SIM swapping and false geolocation. Decentralized IdNFT™ gives users ownership and control over their identity. No private data are stored or uploaded in the cloud. Zero-knowledge proof allows information to be transferred without revealing credentials.
  • 40
    RoboForm Reviews
    RoboForm securely stores your passwords and logs in with just a click or tap. AutoFill is a quick and easy way to save time on long web forms. RoboForm's random password generator creates a strong, unique password for each site. Forget about using weak passwords or duplicate passwords. Share your Login information securely with other RoboForm users. Enter the email address of the recipient and click "Send". RoboForm employs AES256 bit encryption with PBKDF2 SHA256 to protect your data. Two-factor authentication (2FA) is available to allow you to access your account. Your email address and Master Password are required to create your RoboForm Account. Your data is protected by the Master Password. It is the only password you will need to remember. You can add your passwords manually, import from your browser, a CSV or any other password management software. RoboForm automatically saves your new passwords when you log in to online accounts.
  • 41
    OneMorePass Reviews
    OneMorePass provides user security without compromising convenience and ease-of-use. It is a FIDO solution (Fast Identity Online), that uses biometrics and quick authentication to eliminate the need for passwords. A password-less login eliminates all traditional vulnerabilities such as password theft and password loss. Conform to FIDO Alliance International standards based upon the public key. Use multiple authentication methods and manage your integrated authentication lifecycle. You can prevent phishing by notifying anyone who attempts an unauthorized login. Your OneMorePass policy should be configured to comply with your company's policies and standards. OneMorePass can be used with multiple authentication methods, without the need to use passwords. OneMorePass is a user authentication system that provides strong security and user convenience. Flexible authentication options allow you to meet the needs of your users and your own.
  • 42
    BastionPass Reviews

    BastionPass

    BastionWare

    $1.59 per user per month
    BastionPass was created out of necessity to provide a collaborative, all-encompassing platform that can be used by family and coworkers in a way that other password management solutions don't offer. Our goal has been to create a single identity management system and share capabilities using a simple interface. This makes it easy for individuals and teams to manage their passwords. BastionPass will manage your passwords for you so that you don't have to. Our plugin will automatically log you in to all other sites once you have signed in with your master password. You can easily create complex passwords for all of your logins. Keep them safe in our vault, which is triple-encrypted. Access, manage, and share passwords from your desktop or mobile device easily. BastionPass was built from the ground up to meet your digital life requirements.
  • 43
    Evo Security Reviews
    Evo Security allows you to eliminate credential sharing, set up powerful administrative permissions and mass deploy login security. It also helps you meet insurance and compliance requirements. EPIC is a next-generation solution for MSPs and MSSPs. It also provides secure logins to web applications, network devices and endpoints. The secret of managed services is that MSP administrators must share passwords and MFA codes with each other. Password Rotation Tools and Password Managers offer convenience in sharing passwords with some iterative improvement, but ultimately propagate the problem. This involuntary bad practice is no longer acceptable, as cybercriminals are targeting MSPs at an increasing rate and regulations demand a better solution. Easily accommodate scenarios where technicians and administrators require access to the Evo Platform using the Evo Privilege Access Manager.
  • 44
    TeamPassword Reviews
    TeamPassword is a cloud-based password management system for all sizes of teams. TeamPassword was designed with collaboration and ease-of-use in mind. It allows teams to access and manage shared apps, services, tools, and other tools. TeamPassword uses secure encryption technology to protect sensitive information.
  • 45
    ManageEngine Password Manager Pro Reviews
    Password Manager Pro is a vault that stores and manages sensitive information, such as passwords, documents, and digital identities. Password Manager Pro has many benefits. It can be used to eliminate password fatigue and security breaches by creating a secure vault that allows for password storage and access. Automating frequent password changes in critical systems can improve IT productivity. Provide preventive and detective security controls via approval workflows and real-time alerts about password access. Security audits and regulatory compliance such a SOX, HIPAA, and PCI are met.
  • 46
    PassVult Reviews
    PassVult is an intuitive password manager for iPhone. PassVult's main purpose is to give users back control of their password data. It does this by locating all data on an individual iDevice. This makes it possible to protect yourself from vendor breaches and other password managers. Securely store and manage sensitive questions and answers. Manage and store physical codes. Manage your credit cards. Randomly generate complex, secure passwords for your accounts. All this data is stored in an encrypted local database that is AES-encrypted. You can password protect all of these features with a master key. In app web browser. Touch ID and Face ID. All your secrets can be exported. PassVult is the best password storage app for people who value privacy and security. All your data is kept local to your device. We will never share any of your personal information over the internet or the cloud.
  • 47
    JiJi Self Service Password Reset Reviews
    JiJi Self Service Password Reset allows end-users to securely reset their Active Directory passwords without the need for a help desk. This product allows users the ability to reset password, change password, unlock account, reset cached domain password/ update their AD information securely. JiJi Self-Service Password Reset reduces end-user downtime because all actions related to AD accounts can be done from their computer, even if it's not connected to a domain. For example, imagine that your laptop password has expired while you're on vacation. JiJi Self Service Password Recovery allows you to reset the AD cached password on your computer. It does this by authenticating yourself using an internet connection. Are you excited? contact support@jijtechnologies.com to know more details about reset cached domain password through offline network.
  • 48
    Password Depot Reviews
    Our on-premises B2B solution "Password Depot Enterprise Server" offers straightforward implementation with no training required as the software is self-explanatory at a cost-effective price. Collaborate securely on sensitive data across your organization. Securely share passwords, documents, credit card details, and other confidential information with your team, whether across local networks or via the Internet. Your IT department will cherish the Enterprise Server. Password Depot the outstanding password manager made in Germany since 1998.
  • 49
    Mi-Token Reviews
    Multi-Factor Authentication, also known as MFA, is a method of determining if a user has the right to access a website, service, or application. Security experts no longer consider a simple username or password to be effective. MFA uses secure credentials to significantly reduce the chance of identity fraud or malicious attacks. Mi-Token with a one time password (OTP), greatly improves security for your login credentials. It is only valid for one transaction or login session. You can add a pin to the OTP by default. This makes your solution fully compliant for many industry standards, including the Payment Card Industry Standards Council's (PCI DSS 3.2).
  • 50
    Padloc Reviews

    Padloc

    Padloc

    $3.49 per month
    Not only are passwords sensitive information that we deal with in our digital lives, but so is secret notes and license keys. Padloc allows you to store any type of data, including credit card details, license keys, secret notes, license keys, and other sensitive documents. Your data is encrypted from the beginning to ensure that no one can read it. You can share your passwords with family, friends, or colleagues. No problem! Padloc makes it easy for you to share and manage sensitive data within your family, your business, or any other type of organization. Trust is built on transparency and openness. Padloc is being developed completely openly. The source code is available under an open-source license, so anyone can view it, give feedback, or even make contributions at any time.