Best Securden Password Vault Alternatives in 2025

Find the top alternatives to Securden Password Vault currently available. Compare ratings, reviews, pricing, and features of Securden Password Vault alternatives in 2025. Slashdot lists the best Securden Password Vault alternatives on the market that offer competing products that are similar to Securden Password Vault. Sort through Securden Password Vault alternatives below to make the best choice for your needs

  • 1
    1Password Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 2
    ManageEngine ADSelfService Plus Reviews
    See Software
    Learn More
    Compare Both
    Both IT teams and end users are afflicted by password reset tickets. IT teams will often push more urgent issues down the queue to ensure that users don't have their work put on hold while their passwords reset. Password reset tickets can be costly if they aren't addressed promptly. Nearly 30 percent of all help desk tickets were caused by forgotten passwords. It is not surprising that large companies have spent more than $1 million to resolve password-related help desk requests. It is a good habit to change passwords regularly, as it helps prevent cyberattacks caused by stolen credentials. Security experts recommend that administrators ensure that users change their passwords regularly and have password expiration policies in place.
  • 3
    Keeper Security Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 4
    Uniqkey Reviews
    See Software
    Learn More
    Compare Both
    Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind.
  • 5
    JumpCloud Reviews
    See Software
    Learn More
    Compare Both
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 6
    Frontegg Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
  • 7
    Passwork Reviews
    Passwork provides an advantage of effective teamwork with corporate passwords in a totally safe environment. Employees can quickly access all their passwords, while the rights and actions are closely supervised and managed by local system administrators.
  • 8
    Securden Unified PAM Reviews
    Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards.
  • 9
    ManageEngine Password Manager Pro Reviews
    Password Manager Pro is a vault that stores and manages sensitive information, such as passwords, documents, and digital identities. Password Manager Pro has many benefits. It can be used to eliminate password fatigue and security breaches by creating a secure vault that allows for password storage and access. Automating frequent password changes in critical systems can improve IT productivity. Provide preventive and detective security controls via approval workflows and real-time alerts about password access. Security audits and regulatory compliance such a SOX, HIPAA, and PCI are met.
  • 10
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 11
    Zoho Vault Reviews
    You can forget about remembering passwords. Let us do it for you. Zoho Vault, a password manager that protects your passwords and autofills them across all websites and applications, is secure. Vault offers unlimited password storage, seamless autofill, and fine-grained admin controls. Clear security insights into your passwords, both personal and business. You can quickly identify weak passwords and make changes in just a few mouse clicks. Securely store, share, manage, and manage passwords with different access privileges. You can also add documents, notes, credit cards and software licenses to your password vault. You can organize passwords and other confidential information into folders and subfolders to make it easy to manage and share bulk passwords. Users can log in to their daily apps without having to remember passwords. Our catalog supports hundreds of cloud apps and offers options for custom integration.
  • 12
    GateKeeper Enterprise Reviews
    Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity
  • 13
    RevBits Privileged Access Management Reviews
    Secure and Protect Privileged Credentials, Sessions, and Accounts Everywhere! RevBits Privileged Access Management offers six-in-one solutions that include privileged access, privileged session and password, service accounts and key and certificate management, extensive session logging, keystrokes and video capture, and extensive session logging. Native clients for RevBits Privileged access Management are available on common operating systems. As organizations need to manage access in a more comprehensive manner, so will the number of vendors that they use. RevBits Privileged Access Management was designed to provide comprehensive access management and reduce vendor onboarding. Organizations can manage their access with five integrated modules. Product Features: Hardware Tokens Comprehensive Platform Coverage Password Management - Customizable Audit Logs - Extensive Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 14
    Specops Password Policy Reviews
    Get serious about password security. You can enforce compliance, block compromised passwords, help users create stronger passwords for Active Directory, and provide dynamic feedback to clients. Specops Password Policy extends functionality of Group Policy and simplifies the management fine-grained password policies. The solution can be used to target any GPO level or group, user, computer, or computer with dictionary- and passphrase settings. To prevent dictionary attacks, you will need a complete list of all the passwords that are vulnerable. You have many options with our password policy tool. To prevent dictionary attacks from occurring, you can use a password dictionary. This is a file that contains commonly used and/or compromised passwords. Passwords found in the dictionary are rejected by Active Directory during a password change. You can create a custom dictionary that contains passwords that are relevant to your company, including company name and location.
  • 15
    GateKeeper Password Manager Reviews

    GateKeeper Password Manager

    Untethered Labs, Inc.

    $3/user/month
    Proximity-based passwordless login for desktop applications, Macs, websites, PCs, Macs and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords, enforce 2FA and give employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password changes will be reduced. Login to enable auto-lock and presence detection
  • 16
    Bravura Safe Reviews
    Bravura Safe is a zero knowledge secret and passwords manager. It centrally manages and secures decentralized passwords and secrets, so employees don't have too. It can be used in conjunction with core password management solutions already in use by organizations. Bravura Safe draws on two decades of Bravura Security enterprise cybersecurity solutions. Employees can securely send time-bound passwords to new accounts, encryption keys to files, or entire files to Bravura Secure. They don't have to be leaked or intercepted and only need one password to their BravuraSafe. Cybersecurity leaders should be concerned about the recent rise in threats of organizational insiders being paid for their assistance with cyberattacks. This is combined with a notoriously bad secret and password hygiene at an individuals level. IT teams have been focusing on strong SSO, password management and identity, but the rise of work-from-home IT has led to shadow IT.
  • 17
    Core Password Reviews
    Organizations can be burdened by inefficient or manual password management, which can lead to increased security risks and costs. A strong self-service password management system, which automates password resets and enforces stronger password policies, can reduce IT resource dependence and lower access risks. Core Security offers a complete and integrated solution for automated password management. Core Password and Secure Reset combine to offer a secure and convenient password reset solution for your company. Core Password is the industry's best solution for password management. Core Password is a leading self-service password recovery tool. It offers multiple access options, robust integration with the service desk, and the ability enforce consistent password policies across any system, application, web portal, or other system.
  • 18
    Vault One Reviews

    Vault One

    VaultOne Software

    $99 per month
    You have complete control over who has access to your data, systems and infrastructure. This will prevent cyber attacks and data breaches. VaultOne helps you to protect your company's assets and ensure compliance. VaultOne is reinventing the concept behind privileged access management (PAM). VaultOne is reinventing the concept of privileged access management (PAM). It allows you to manage user access, credentials, and sessions in a fast and secure way. We offer multiple features such as a digital vault, password generator and sessions recording, auditing, reporting, customizable policies and disaster recovery. You've found the right solution to protect shared accounts, certificates, and user access to websites, applications, servers, databases and cloud services. You can prevent data breaches by creating custom access policies and managing privileges.
  • 19
    Bravura Pass Reviews
    Bravura Pass is an integrated solution that allows you to manage credentials across multiple systems and applications. It makes it easy to manage passwords, tokens smart cards, security questions, and biometrics. Bravura Pass reduces IT support costs and improves security of login processes. Bravura Pass includes password sync, self-service password reset and PIN reset as well as strong authentication, federated and federated access, enrollment in biometrics and security questions, and self-service unlocking of encrypted drives.
  • 20
    Enzoic for Active Directory Reviews
    Managing password security in Active Directory can be challenging, but it doesn’t have to be. Enzoic makes it easy with automated, always-on protection that works quietly in the background. Designed for IT professionals, it delivers smarter security without adding unnecessary complexity. - Always-On Monitoring: Passwords and credentials are automatically protected 24/7—no manual effort required. - Real-Time Breach Defense: Daily updates block compromised passwords before they pose a risk. - Comprehensive Coverage: Protects not just passwords but entire credential sets to reduce vulnerabilities. - Block Weak Passwords: Prevents predictable options like "Password123" while guiding users to create stronger alternatives. - Effortless Compliance: Achieve NIST 800-63B compliance with built-in protections and policies. - User-Friendly Tools: An optional Windows client provides real-time feedback to users, reducing IT workload. Cutting-Edge Threat Intelligence: With billions of compromised passwords updated daily, Enzoic protects your systems from new and old breaches alike. Built for IT, Designed for Simplicity: Enzoic integrates seamlessly into your environment, eliminating unsafe passwords and improving security.
  • 21
    Avatier Identity Anywhere Reviews
    Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time.
  • 22
    LastPass Reviews
    Top Pick

    LastPass

    LastPass

    $4 per user per month
    32 Ratings
    LastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere.
  • 23
    DDP Mobile Edition Reviews
    Employees, vendors, and partners can all work from anywhere and at any time. Smartphones and tablets that are owned by individuals, such as laptops and desktops, have become a standard tool for work. Most organizations embrace the bring your own devices movement because it reduces equipment costs and increases productivity. Without proper encryption and password enforcement data accessed from mobile devices is not protected, regardless of whether it is accessed from a corporate server, or a public cloud. If the device is lost, stolen, or data is accessed via an open wireless hotspot it could be hijacked. This could put companies at risk of compliance violations and security breaches. IT teams struggle to find the right balance between protecting data and limiting worker productivity. Mobile Edition helps to put IT back in control of data security by enabling you to protect data.
  • 24
    Sysgem Password Management Reviews
    These tools are effective in optimizing day-to-day password management. They can be used to ensure compliance with regulatory and corporate security regulations and free up your helpdesk. Sysgem Self-Service password reset must be installed in three parts. The domain controller should host the central service. The web enrolment system should be installed on any IIS server within the domain. End-users should also install the workstation component on their workstations in order to reset their passwords on demand. The Domain Controller runs a Windows Service that resets passwords for end users. It also has a database of questions, which are created and used to verify the identity of the person who wishes to reset their password.
  • 25
    OAuth Reviews

    OAuth

    OAuth.io

    $19 per month
    You can focus on your core app to get to market faster. OAuth.io handles all aspects of identity infrastructure, maintenance, security overhead, so your team doesn’t have to. OAuth.io makes identity easy. You can choose from a variety of identity providers, add custom attributes and customize your login page. Or, you can use our widget to integrate with your app. Identity solved in minutes. Our easy-to-use dashboard allows you to manage your users. You can find and manage users, reset passwords and enforce two-factor authentication. You can also add permissions and memberships through OAuth.io’s user management. Full-featured, highly secure user authentication with tokens or passwords. OAuth.io can handle all aspects of user authorization modeling, from multi-tenant to complex permissions. Our popular integrations can be used to force a second factor for user authentication.
  • 26
    Passly Reviews
    Every organization should consider Secure Identity & Access Management due to the increasing number of remote workers, increased dependence on cloud applications, as well as explosive increases in cyber theft. IT teams can quickly, easily, and economically enable the right people to access the right resources using Passly™, a Kaseya company. Secure Password Management, Single Sign On, Multi-Factor authentication, and many more. It's crucial to choose the right secure identity and access management platform in a world where cyberattacks are more common than ever. Nearly 80% of all data breaches are due to weak passwords. Passly is the most cost-effective and comprehensive solution to ensure security, compliance, efficiency, and compliance. Techs can store and manage passwords for personal, business, or shared accounts using shared password vaults. It is centralized and easy-to-use
  • 27
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 28
    pwncheck Reviews
    Pwncheck, an offline Active Directory password auditing program, is designed to identify weak or compromised passwords in an organization's network. Pwncheck uses a comprehensive database of compromised passwords, which includes data from Troy Hunt's HaveIBeenPwned database (HIBP), to enable administrators to detect users using compromised credentials. The tool is not installed and only requires a machine that can connect to a domain server. It delivers comprehensive results within three minutes. The tool's key features include the detection and identification of blank passwords and shared passwords between users. It can also generate detailed reports that are suitable for senior management and auditors. Pwncheck is completely offline, which eliminates the legal and security concerns that come with storing breached data on corporate networks. This ensures user hashes, and passwords, remain secure.
  • 29
    TraitWare Reviews
    TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
  • 30
    NordPass Business Reviews
    Top Pick

    NordPass Business

    Nord Security

    $3.59 per user / per month
    7 Ratings
    NordPass Business is a password manager for SMBs and Enterprises to help optimize the company’s workflow and boost productivity. With NordPass Business you can: - Quickly onboard and offboard your employees - Easily exchange passwords within the team - Ensure that your customers’ data are safe and sound - Get detailed security insights and see breached domains and many more! Start a 30-day free trial (no card required) to boost your company’s productivity and safety.
  • 31
    Universal SSH Key Manager Reviews
    Secure your business using a proven key-less management solution. Discover and manage your SSH keys to minimize risks. Automation features reduce complexity. Never again fail an IT audit due to unmanaged SSH key. SSH keys are passwords, but they're 10 times more common. We scanned the environment of a financial institution. This death star was the result. Their Privileged Access Management (PAM) security controls were being bypassed with unauthorized, test-to-production, and application-to-application connections. SSH keys can be complex and unmanaged. Malicious actors then seek out these unmanaged SSH key. UKM eliminates security risks that are caused by ungoverned SSH keys, even if they appear legitimate to your security controls. UKM allows you to manage and discover all authentication key configurations, SSH login files, and key configurations in a universal SSH key management system.
  • 32
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business.
  • 33
    TeamPassword Reviews
    TeamPassword is a cloud-based password management system for all sizes of teams. TeamPassword was designed with collaboration and ease-of-use in mind. It allows teams to access and manage shared apps, services, tools, and other tools. TeamPassword uses secure encryption technology to protect sensitive information.
  • 34
    passbolt Reviews

    passbolt

    passbolt

    €45/month/10 users
    1 Rating
    Finally, a password manager that is designed for collaboration. Secure, flexible, and ready for automation. Trusted by over 10,000 organizations, including Fortune 500 companies and newspapers as well as governments and military forces. Passbolt servers have been designed to be easy to set up and manage. They are enterprise-ready and can be configured to support high availability. Passbolt is available via your browser or your mobile phone. Real-time sharing is possible. Desktop apps are on the horizon. The JSON API allows you to retrieve, store, and share passwords programmatically. Automate at scale using Passbolt CLI Access logs in real-time. Privacy is part of our DNA, and also in the DNA European laws (to ensure we don't change minds). Passbolt's self-hosted source code is covered by an AGPL license. Yes, even the commercial version. It is free to be audited, contributed to, and redistributed. This is why we have thousands of organizations from all sectors.
  • 35
    Salesforce Shield Reviews
    With platform encryption, you can natively encrypt sensitive data at rest across all Salesforce apps. AES256-bit encryption ensures data confidentiality. You can create your own encryption keys and manage the key lifecycle. Protect sensitive data from all Salesforce users, including admins. Conform to regulatory compliance requirements. Event monitoring allows you to see who, when, and where critical business data is being accessed. Log files can be used to monitor critical events in real time. Transaction security policies can prevent data loss. Detect insider threats and report anomalies. Audit user behavior and measure the performance of custom applications. You can create a forensic audit trail that includes up to 10 years' worth of data and set triggers for data deletion. Expand tracking capabilities for custom and standard objects. Extended data retention capabilities are available for audit, analysis, and machine learning. Automated archiving can help you meet compliance requirements.
  • 36
    Evo Security Reviews
    Evo Security allows you to eliminate credential sharing, set up powerful administrative permissions and mass deploy login security. It also helps you meet insurance and compliance requirements. EPIC is a next-generation solution for MSPs and MSSPs. It also provides secure logins to web applications, network devices and endpoints. The secret of managed services is that MSP administrators must share passwords and MFA codes with each other. Password Rotation Tools and Password Managers offer convenience in sharing passwords with some iterative improvement, but ultimately propagate the problem. This involuntary bad practice is no longer acceptable, as cybercriminals are targeting MSPs at an increasing rate and regulations demand a better solution. Easily accommodate scenarios where technicians and administrators require access to the Evo Platform using the Evo Privilege Access Manager.
  • 37
    BastionPass Reviews

    BastionPass

    BastionWare

    $1.59 per user per month
    BastionPass was created out of necessity to provide a collaborative, all-encompassing platform that can be used by family and coworkers in a way that other password management solutions don't offer. Our goal has been to create a single identity management system and share capabilities using a simple interface. This makes it easy for individuals and teams to manage their passwords. BastionPass will manage your passwords for you so that you don't have to. Our plugin will automatically log you in to all other sites once you have signed in with your master password. You can easily create complex passwords for all of your logins. Keep them safe in our vault, which is triple-encrypted. Access, manage, and share passwords from your desktop or mobile device easily. BastionPass was built from the ground up to meet your digital life requirements.
  • 38
    Enzoic Account Takeover Protection Reviews
    Protect your users with seamless Account Takeover prevention. Enzoic's Rest API integrates seamlessly into your login, password reset, and account setup workflows. It provides real-time detection for compromised credentials from third party breaches. This allows you to take immediate actions, such as requiring a reset of passwords or enabling step up authentication, to keep your accounts secure. Enzoic provides proactive protection without affecting the user's experience. Our solution reduces fraud by using a database of billions compromised credentials. Enzoic can identify and neutralize risks from recent breaches or older ones. Enzoic is designed for flexibility and ease-of-use. It allows your organization to stay on top of account takeover threats, while maintaining smooth operations.
  • 39
    Intercede MyID Reviews
    MyID®, credential management software, allows governments and large corporations to issue and manage digital identity using the most secure method for multi-factor authentication to citizens and large workforces. MyID allows millions of people to securely authenticate themselves to the data, systems, and networks they need. MyID makes it easy for those responsible for information security to integrate and manage digital identity management and issuance. MyID allows seamless, secure access to company networks, systems, and resources for citizens and employees using multi-factor authentication via a variety devices. MyID®, a cyber secure credential management solution, is able to address the ever-growing threats of cyber terrorism and identity fraud. MyID is the best choice for data management. MyID software is distinguished by its reliability, security, and interoperability.
  • 40
    Devolutions Server Reviews
    IT teams often face difficulties managing shared credentials and accounts securely, especially when multiple users need access to the same resources. Devolutions Server (DVLS) offers a self-hosted, shared account and credential management solution that helps organizations centralize, secure, and audit their credentials. By providing role-based access controls, encryption, and audit logs, DVLS ensures that only authorized users can access critical accounts, minimizing security risks and improving compliance. In addition to core credential management, DVLS includes optional privileged access components for organizations needing enhanced control over sensitive accounts. Seamlessly integrated with Remote Desktop Manager, it allows IT professionals to manage both credentials and remote sessions securely from a single platform. With DVLS, organizations can optimize their credential management processes while maintaining the highest level of security and accountability.
  • 41
    LogonBox Reviews
    Find the LogonBox Advantage and our innovative solutions for modern Enterprises. LogonBox is an independent software vendor. It develops software that helps organizations manage and protect user identities and credentials. LogonBox solutions can reduce helpdesk calls, increase productivity, secure access across heterogeneous enterprise environments, and protect network resources through the extension of authentication beyond the password.
  • 42
    Daito Reviews
    Daito is a web-based 2FA authentication tool for small and large companies. No phone required to securely share access. Daito does one thing: it manages TOTP 2FA tokens. This gives you a completely isolated system that is independent from your password manager. To avoid worst-case scenarios, keep your 2FA token management separated from your password management. What should you do if your password manager is breached and usernames, passwords and 2FA seeds are stored? The authenticator can be accessed from any web browser. You can access and manage 2FA tokens for your company from any browser or OS. You can save money and avoid the hassle of managing company phones. No more worries about lost, broken, or missing devices. Give IT admins and IT teams full control and limit regular users. Limit access to generated tokens only, and not the underlying seed code, to prevent 2FA seed leakage.
  • 43
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • 44
    IDSync Reviews
    Active Directory to Active Directory Identity Synchronizer Software. Solves Password Sharing Problems, Overly Broad "rights" for IT staff and supports user enablement/disablement for Customer's Active Directory. The Identity Syncronizer Active Directory-to Active Directory platform allows an MSP to connect its On-Premise Active Directory to customers' Active Directory for the purpose of provisioning and synchronizing user metadata as well as passwords for its technicians who will be accessing customers' Active Directory and networks. IDSync is an interface that allows the MSP to identify technicians and identify target Active Directory addresses into which they will be provisioned. Provisioning and synchronization can either be done at the user level or in bulk via security group.
  • 45
    Devolutions Hub Reviews

    Devolutions Hub

    Devolutions

    49.99 USD / Named User
    Devolutions Hub is a cloud-based, secure password manager that empowers IT professionals and team members to safeguard sensitive data and streamline credential management. Built for teams, it provides advanced security features like encryption, multi-factor authentication, and audit logs, ensuring full control over access to critical systems. With a user-friendly interface, Devolutions Hub supports collaboration across departments, enabling secure password sharing and management from any device, anywhere. It’s a perfect fit for organizations looking to strengthen their security posture while maintaining productivity.
  • 46
    Specops Password Sync Reviews
    Users can streamline passwords by using one password across multiple business systems. Specops Password Synchro instantly syncs Active Directory passwords with domains or other systems. This includes domains within the same forest/other forests, and on-premises systems (e.g. Kerberos, and SaaS targets (e.g. O365 This tool increases security by ensuring that all systems have the same password complexity. Specops Password Sync extends Active Directory password security to all business systems, even external SaaS resources. The product, when combined with a strong password policy ensures that all connected systems have the same level of complexity.
  • 47
    PortalGuard Reviews
    BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods.
  • 48
    nFront Password Filter Reviews
    nFront Password filter is a powerful password policy enforcement tool designed for Windows Active Directory. It prevents the use of weak passwords that are easily cracked. It allows administrators to create up to 10 different password policies, each applicable to a specific security group or organizational unit. The software has a number of key features, including the ability to set maximum and minimum limits for specific character types, rejecting passwords that contain usernames, and performing dictionary checks against an over 2 million word database in multiple languages, all within less than a second. The software also supports a length-based password ageing, which encourages users to create longer and more secure passwords. nFront Password Filter also allows users to check their proposed passwords against a compromised password database, enhancing security and preventing the reuse or re-use of compromised credentials.
  • 49
    LockPass Reviews
    The safe that protects your data and the use of your employees. Our suite of intuitive, secure, and simple solutions will help you better manage your employees' data. Your company passwords can be easily stored, managed, and shared. You can take the worry out of managing your applications and create consistent management throughout your organization. Send sensitive or large files securely while maintaining control over your shares. The tool's simplicity makes it easy to adopt good practices, especially via the Outlook/Office365 plugin. LockFiles secure environment allows you to quickly access sensitive files from your team or projects. You can protect your information assets and grant access to each directory created. Passwords can also be shared within a project, with clients, or by type of resource.
  • 50
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.