Best SharePass Alternatives in 2025

Find the top alternatives to SharePass currently available. Compare ratings, reviews, pricing, and features of SharePass alternatives in 2025. Slashdot lists the best SharePass alternatives on the market that offer competing products that are similar to SharePass. Sort through SharePass alternatives below to make the best choice for your needs

  • 1
    1Password Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 2
    Satori Reviews
    See Software
    Learn More
    Compare Both
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 3
    Titaniam Reviews
    Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022.
  • 4
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 5
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 6
    Immuta Reviews
    Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals.
  • 7
    Fortanix Data Security Manager Reviews
    A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing.
  • 8
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 9
    Dataguise Reviews
    Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data.
  • 10
    Onboardbase Reviews
    Onboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.
  • 11
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 12
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 13
    Sophos Central Device Encryption Reviews
    Remote working has made it more critical than ever to protect computers and data. Full disk encryption is a critical first line of defense against theft or loss of laptops. Sophos Central Device encryption leverages Windows BitLocker as well as macOS FileVault to protect devices and data.
  • 14
    Roseman Labs Reviews
    Roseman Labs allows you to encrypt and link multiple data sets, while protecting the privacy and commercial sensitivity. This allows you combine data sets from multiple parties, analyze them and get the insights that you need to optimize processes. Unlock the potential of your data. Roseman Labs puts the power of encryption at your fingertips with Python's simplicity. Encrypting sensitive information allows you to analyze the data while protecting privacy, commercial sensitivity and adhering GDPR regulations. With enhanced GDPR compliance, you can generate insights from sensitive commercial or personal information. Secure data privacy using the latest encryption. Roseman Labs lets you link data sets from different parties. By analyzing the combined information, you can discover which records are present in multiple data sets. This allows for new patterns to emerge.
  • 15
    Bravura Safe Reviews
    Bravura Safe is a zero knowledge secret and passwords manager. It centrally manages and secures decentralized passwords and secrets, so employees don't have too. It can be used in conjunction with core password management solutions already in use by organizations. Bravura Safe draws on two decades of Bravura Security enterprise cybersecurity solutions. Employees can securely send time-bound passwords to new accounts, encryption keys to files, or entire files to Bravura Secure. They don't have to be leaked or intercepted and only need one password to their BravuraSafe. Cybersecurity leaders should be concerned about the recent rise in threats of organizational insiders being paid for their assistance with cyberattacks. This is combined with a notoriously bad secret and password hygiene at an individuals level. IT teams have been focusing on strong SSO, password management and identity, but the rise of work-from-home IT has led to shadow IT.
  • 16
    Anchor Reviews
    Anchor's file-security platform is built using zero-trust principles to secure, control and manage your sensitive files while remaining invisible to end users. Traditional cybersecurity focuses primarily on locking down devices, networks, and people. All of this is done under the pretext of data security. Once files are shared, moved, or stolen, they are no longer protected. These controls frustrate users and get in their way. Cyber Insurance rates are increasing, as are the requirements to obtain coverage. The coverage is also decreasing. Most insurance companies require MFA in order to be covered and exclude ransom payments for stolen data. You can satisfy MFA and also eliminate the possibility that your data could be stolen and used against yourself.
  • 17
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 18
    InPrivy Reviews

    InPrivy

    InPrivy

    €30 per year
    Share sensitive information easily with clients, co-workers and friends. Use InPrivy for sharing passwords and sensitive information in a safe way. Your confidential data will not be visible in chats or emails. It is important to keep your private data secure. This includes passwords, API keys and credit card information. Your data will be visible for a long period of time even if you send them via email or messengers. Use InPrivy to share your data in a secure manner. InPrivy is 100% German-made, with no ads and no excessive user tracking. We guarantee strong protection of your sensitive data. You can access the site from any device, without needing to install any apps. Only you know the link to the secret information that you created. It is your responsibility to give it to the person who needs it. These links are protected with SSL encryption and can only be used once. Strong AES256 encryption protects the secret information.
  • 19
    Varonis Data Security Platform Reviews
    The most powerful way to monitor and protect sensitive data at large scale. The all-in-one data security solution that doesn't slow down will help you reduce risk and detect abnormal behavior. You get a platform, a team, an approach, and a plan that gives you every advantage. Classification, access governance, and behavioral analytics all work together to secure data, prevent threats, and ease the burden of compliance. Our proven method to monitor, protect and manage your data is backed by thousands of successful rollouts. Hundreds of security professionals are able to create advanced threat models, update policies, and assist in incidents, allowing you to concentrate on other priorities.
  • 20
    DataGuard Reviews
    Our AI-powered platform will help you get certified quickly. Understand, identify and manage security and compliance risks. We help customers overcome these challenges by integrating a security posture with their overall objectives using a unique, iterative, and risk-based method. We help businesses achieve robust digital security management and compliance with 40% less effort, and a more efficient budget. Our AI-powered platform automates repetitive work, simplifies compliance to complex regulations and frameworks and helps mitigate risks before they disrupt business. Our in-house experts can provide additional support if needed, advising on all security and compliance challenges for organizations now and in the future.
  • 21
    Infisical Reviews

    Infisical

    Infisical

    $6 per month
    Compare secrets between environments to see what is different or missing. Set personal values to secrets, either for sensitive secrets or during local development. You can easily inherit other secrets in order to establish a single truth. Infisical’s continuous monitoring and pre commit checks can be used to automatically identify and prevent leaks of secrets into git. Support for over 140 secret types.
  • 22
    Sealit Reviews
    You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you.
  • 23
    SalaX Secure Collaboration Reviews
    SalaX Secure Collaboration, an all-in one solution, makes it simple to encrypt audio/video, chat, and email communications for privacy and compliance. It includes SalaX Secure Messaging, and SalaX Secure Mail to provide secure channels for sharing confidential or restricted information. SalaX Secure Collaboration was developed with security in mind. It offers flexible deployment options and full audit trails, allowing organizations control over their data. Video conferencing, file sharing, messages, calls and files are all encrypted. We secure your critical communications. Public cloud, private cloud or on-premises deployments can meet data sovereignty requirements. Send messages without leaving any traces on public servers. You can control your encryption keys. Email or chat services can send attachments up to 30MB. With our solution, you can send up to 1GB.
  • 24
    Confidant Reviews
    Lyft's Confidant is an open-source secret management service that allows users to store and access secrets in a secure manner. Confidant solves both the authentication chicken-and-egg problem by using AWS KMS, IAM to allow IAM role to generate secure authentication tokens which can be verified by Confidant. Confidant also manages KMS grant for your IAM role, which allows IAM roles to generate tokens that are used for service-to–service authentication or to transmit encrypted messages between services. Confidant stores secrets using DynamoDB in an append-only manner. It generates a unique KMS key for each revision of every secret by using Fernet symmetric authenticated encryption. Confidant offers an AngularJS web interface which allows end-users easy access to secrets, the mappings secret to services, and the history of any changes.
  • 25
    Keywhiz Reviews
    Keywhiz is a system that manages and distributes secrets. It can be used in conjunction with service-oriented architecture (SOA). Here's a brief overview in presentation format. Common practices include placing secrets in config files alongside code and copying files to servers outside-of-band. The former is more likely to be leaked, while the latter is more difficult to track. Keywhiz makes it easier and safer to manage secrets. Keywhiz servers in clusters centrally store secret information encrypted in a database. To retrieve secrets that they have access to, clients use mutually authenticated TLS(mTLS). Authenticated users administer Keywhiz via CLI. Keywhiz offers automation APIs that allow for workflows. Every organization has services and systems that require secrets. Secrets such as API tokens, GPG keys and TLS certificates/keys. Keywhiz is reliable and can be used in production. However, API backward compatibility may be broken by occasional changes.
  • 26
    SearchInform FileAuditor Reviews
    DCAP solution (datacentric audit and protection), for automated file system audit, search and detection of access violations, as well as monitoring for changes in critical data.
  • 27
    Hemmelig.app Reviews
    Paste a password, confidential message, or private data. Secure, confidential, and encrypted sensitive data is what you want. By default, the secret link is only available for a single use. Hemmelig, [he`m:(@)li], means secret in Norwegian.
  • 28
    SecretHub Reviews

    SecretHub

    SecretHub

    $99 per month
    Unified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team.
  • 29
    Knox Reviews
    Knox is a secret management system. Knox allows you to store and rotate secrets, keys, passwords, and other information. Pinterest has many keys and secrets that can be used to sign cookies, encrypt data, protect our network via TLS, access our AWS machines, communicate with third parties, and many other things. Rotating (or changing) keys can be difficult if they are compromised. This usually involves a deploy and most likely a code change. Pinterest keys/secrets were stored in git repositories. These keys were stored in git repositories and copied all over the company's infrastructure. They were also present on many employees' laptops. It was impossible to audit who had access to the keys and who did not. These problems were solved by Knox. Developers can access/use confidential keys and credentials with ease. Confidentiality of secrets, keys and credentials. In the event of compromise, provide mechanisms for key rotation.
  • 30
    Yandex Lockbox Reviews

    Yandex Lockbox

    Yandex

    $0.0277 per 10000 operations
    Create secrets using the API or the management console. Your secrets are stored safely in one place and can be easily integrated with cloud services. They are also accessible by external systems via the gRPC API or REST API. Yandex Key Management Service can be used to encrypt your secrets. Secrets are only kept in encrypted form. You can select from pre-configured roles to gain granular access. Set access permissions for reading or managing your secret or its metadata. Create a secret and select a Key Management Service key to securely store your login and password pairs and other sensitive data. A secret can contain any confidential information you have, such as a login-password pair. A login-password combination, server certificate keys or cloud service account key. The service can store multiple versions of data for each secret. This data is stored in an encrypted form by the service. All secrets are replicated across three availability zones.
  • 31
    BooleBox Reviews
    BooleBox, a content security platform, protects clients' data integrity and confidentiality from unauthorized access. It also ensures the highest level encryption to protect sensitive information from hackers. Users can now create, edit, share, and classify files and folders without compromising their usability thanks to an advanced encryption system. We protect your data wherever it is: at work, in transit via email, in shared projects, in the cloud, in the cloud, in transit via E-mail, in shared projects and on the most popular platforms such as Windows, Outlook and Gmail, OneDrive, SharePoint, and OneDrive. Because we understand the potential digital vulnerabilities of your data, we can protect them like no other. It doesn't abandon it, and it follows it everywhere! We protect large amounts data in many business sectors. Since 2011, we have been doing this every single day.
  • 32
    WinZip SafeShare Reviews

    WinZip SafeShare

    WinZip

    $34.95 one-time payment
    Modernized sharing experience. You can share your files with confidence and security in an intuitive environment designed with simplicity in mind. This powerful sharing tool allows for you to share, compress, encrypt and decrypt files all within a simple interface. You can easily share files to one or more locations. Additional layers of security include military-grade encryption, time bomb capabilities, and extra layers of encryption. You can now enjoy expanded cloud services such as OpenStack and SwiftStack regions, credential files, Alibaba and Wasabi, HP and Oracle, Azure, WebDAV and CenturyLink, IONOS, and OVH cloud providers. To save, zip, and share multiple PDF files, combine them into one PDF file. Slack IM streamlines workflow for sharing files. WinZip and ZipShare files can be managed. View, open, share again, or delete shared files. Keep track of the Zip files that you have shared via ZipShare or WinZip. You can email anyone directly using WinZip by adding contacts to all supported sources into one address book.
  • 33
    Salesforce Shield Reviews
    With platform encryption, you can natively encrypt sensitive data at rest across all Salesforce apps. AES256-bit encryption ensures data confidentiality. You can create your own encryption keys and manage the key lifecycle. Protect sensitive data from all Salesforce users, including admins. Conform to regulatory compliance requirements. Event monitoring allows you to see who, when, and where critical business data is being accessed. Log files can be used to monitor critical events in real time. Transaction security policies can prevent data loss. Detect insider threats and report anomalies. Audit user behavior and measure the performance of custom applications. You can create a forensic audit trail that includes up to 10 years' worth of data and set triggers for data deletion. Expand tracking capabilities for custom and standard objects. Extended data retention capabilities are available for audit, analysis, and machine learning. Automated archiving can help you meet compliance requirements.
  • 34
    Enveil Reviews
    We change the way organizations use data to unlock value. Data is the backbone for the digital economy. Enveil's award winning ZeroReveal®, solutions allow enterprises to securely and privately access data across organizational boundaries, jurisdictions and third parties. The interaction and results are never revealed. Our homomorphic encryption-powered capabilities and PETs provide a decentralized and efficient data collaboration framework that addresses business challenges such as data sharing, monetization and regulatory compliance. We offer the most advanced encrypted search, analytic and machine learning products in the market to protect data while it is being used or processed. This is the 'holy-grail' of secure data use. Enveil is a pioneering privacy-enhancing technology company that protects data for secure data sharing, usage, and monetization.
  • 35
    Strongbox Reviews

    Strongbox

    Strongbox

    $2.49 per month
    Strongbox offers best-in-class secure password management to help you keep your data private. You are protected from digital attacks using industry-standard formats, military-grade cryptography, and recognized best practices. Strongbox provides a beautiful native experience for iPhones, iPads, and Macs. The ultimate KeePass iOS password manager. Strongbox is an iOS and MacOS native app. It looks and feels exactly like an App should. Strongbox is natively designed with Apple's human interface guidelines and standard UI controls, colours, and integrations in mind. AutoFill integration makes it easy to use Safari or other Apps to fill out a password. Simply tap the Strongbox suggestion to the right of your keyboard and authenticate. Face ID can be used to unlock your database automatically.
  • 36
    Password.link Reviews

    Password.link

    Password.link

    €8.99 per month
    The link can only once be opened. This means that it cannot be opened more than once. After it has been viewed, the encrypted secret is deleted automatically from our database. It is impossible to view it again. Leaving secrets in plain text exposes them even to threats long after the message is gone. A one-time link is a way to ensure that there are no valid credentials in email inboxes, or archived instant messages. The link contains half of the encryption key and is never shared with anyone. Without the original link, it is impossible to view the secret. You can use our service to create a unique link to the credentials. This will ensure that no one sees them except the recipient. You can also set up notifications to be sent via various channels so that you know when credentials have been viewed and by whom.
  • 37
    Pulumi Reviews
    Modern Infrastructure as Code. Use familiar programming languages and tools to create, deploy, manage, and monitor infrastructure in any cloud. One workflow for many clouds. On any cloud, you can use the same language, tools, or workflow. Collaborate. Harmonize your engineering practices among developers and operators. Easy continuous delivery. You can deploy from the CLI or integrate with your favorite CI/CD software. All changes are reviewed before they are made. Reduce complexity. Get visibility across all your environments. Audit and secure. Know who made changes to what, when and why. With your identity provider of choice, enforce deployment policies. Secrets management. Secure secrets with an easy-to-use encrypted configuration Familiar programming languages. You can define infrastructure in JavaScript or TypeScript, Python, Go or any other.NET language including C#, F# and VB. Use your favorite tools. Use familiar IDEs and test frameworks. Reuse and share. Codify best practices.
  • 38
    Entropy Keycrypt Reviews
    Entropy offers a seamless, secure transition from your trusted circle to your digital assets in the event of an emergency. Security that is User-Friendly Entropy allows you to securely partition your important information into discrete share, which each do not reveal anything about your secret without the other. Distribute them to a small group of trusted people who can store them offline. Long-Term Resilience Entropy's robust security features include 256-bit encryption. This allows for decentralized, durable offline storage that protects your data against both online and offline threats.
  • 39
    Drone Reviews
    Configuration as code. Pipelines are created with a simple, readable file that is then committed to your git repository. Each step of a pipeline is executed in a Docker container, which is automatically downloaded at runtime. Any source code manager. Drone.io seamlessly integrates with multiple source code management system, including Bitbucket and GitHubEnterprise. Any platform. Drone natively supports multiple operating system and architectures, including Linux x64/ARM/ARM64/Windows x64. Any language. Drone can communicate with any language, database, or service that runs within a Docker container. You can choose from thousands of Docker images, or create your own. Make and share plugins. Drone uses containers to drop preconfigured steps into your pipeline. You can choose from hundreds of pre-made plugins or create your own. Drone allows for advanced customization. You can create custom access controls, approve workflows, secret management, yaml syntax extension, and other features using drone.
  • 40
    Akeyless Vault Reviews
    Secure vaults allow you to automate and protect access to credentials, keys and tokens across your DevOps tools, Cloud platforms, and API-Keys using your Cloud platforms.
  • 41
    Foretrace Reviews
    Find exposed data before your competitors do. Foretrace’s Total Recon™, a patent-pending engine, detects data leakage and alerts you to it before it leads to costly breaches. Credentials may be exposed through data breaches, leaks or public sources such as code repositories. Hackers use exposed account names and passwords to identify and target specific accounts. Exposed documents and collaboration suites may leak sensitive information. These data can be used by adversaries to blackmail or damage organizations' reputations. Metadata is found in almost every document or file created, and is rarely removed prior to sharing. These metadata are used by attackers to target phishing and malware. On criminal and dark-web forums, stolen or discovered corporate data and credentials can be sold and traded. This gives attackers easy access and could damage an organization's reputation.
  • 42
    Privacy1 Reviews

    Privacy1

    Privacy1

    $159 per month
    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level
  • 43
    PHEMI Health DataLab Reviews
    Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
  • 44
    LightBeam.ai Reviews
    Find out in minutes if you have sensitive data hidden in places that you didn't expect (Screenshots and logs, messages, tickets, tables, messages). LightBeam's executive or delta reports can be generated with just one click to gain valuable insight into your sensitive data. Automate DSRs by leveraging LightBeam’s unique PII/PHI charts, which are comprehensively created based on your data infrastructure. By giving your users control over the data they collect, you can build trust with them. Monitor how sensitive data are collected, shared and maintained within your organization.
  • 45
    Conjurers Encrypter Reviews
    Conjurers Encrypter 4 (or simply CE 4) is a powerful, yet simple-to-use freeware file encryption utility. It can be used to quickly encrypt files and folders and protect your confidential and important data. Encryption refers to the process of encoding information so it cannot be accessed by others without the secret key. While encryption is used to protect sensitive documents and information, encryption can also be used to prevent people from viewing your personal data. It is possible to send important files over the internet after encrypting them. This eliminates the possibility of the contents being seen by anyone other than the recipient, even bypassing attacks such as Network Sniffing.
  • 46
    ManageEngine DataSecurity Plus Reviews
    ManageEngine DataSecurity Plus lets you take control of sensitive data. Take a look at the most recent user activity, file activity, as well as access trends. The four Ws of every access are who accessed it, when and from where. The most important events, such as sudden permissions changes, file deletions and renaming events, are those that matter the most. Identify the most active users, most frequently accessed files, as well as the most modified files within your file system. You can set up instant alerts to notify you of sudden spikes in folder or file access or modification events. Receive real-time notifications when multiple attempts are made to access critical files. After business hours, monitor changes to sensitive files. Monitor only critical files, folders and shares. Receive real-time alerts when files are modified in an unauthorized manner. To detect unusual activity and misuse of privileges, configure threshold-based alerts that monitor user-generated events.
  • 47
    NordLocker Reviews
    Leading-edge encryption at your fingertips. We use the most sophisticated ciphers and principals, including Argon2, AES256 and ECC (with Poly1305, EdDSA, and XChaCha20), to ensure your files are secure. Think about all the personal files that you would rather keep private. You can prevent them from falling into the wrong hands or being used in malicious ways. Finances, IDs, passwords. This information could lead to identity theft and loss of money. NordLocker provides top-notch security for sensitive data. NordLocker secures your sensitive data from prying eyes, so it doesn't matter if it's your diary and secret music collection. NordLocker will protect your files and show your professionalism when you share your work with clients.
  • 48
    passbolt Reviews

    passbolt

    passbolt

    €45/month/10 users
    1 Rating
    Finally, a password manager that is designed for collaboration. Secure, flexible, and ready for automation. Trusted by over 10,000 organizations, including Fortune 500 companies and newspapers as well as governments and military forces. Passbolt servers have been designed to be easy to set up and manage. They are enterprise-ready and can be configured to support high availability. Passbolt is available via your browser or your mobile phone. Real-time sharing is possible. Desktop apps are on the horizon. The JSON API allows you to retrieve, store, and share passwords programmatically. Automate at scale using Passbolt CLI Access logs in real-time. Privacy is part of our DNA, and also in the DNA European laws (to ensure we don't change minds). Passbolt's self-hosted source code is covered by an AGPL license. Yes, even the commercial version. It is free to be audited, contributed to, and redistributed. This is why we have thousands of organizations from all sectors.
  • 49
    AVG BreachGuard Reviews
    You can take control of your online privacy and protect your data from being stolen. You should monitor the dark web for any leaked passwords and personal information. Examine your passwords to determine if any of your personal information is at risk. Get advice on how to strengthen them. As you browse the internet, opt out of companies that try to collect or use your personal information. Send automatic requests to remove your personal information from data broker databases. You can ensure your data is protected by automatically resending requests for removal. Stop marketers from collecting personal information and selling it to others. Check out how much of your personal data can be seen publicly through social media. To ensure that you don't share any more information than necessary, learn how to set your privacy settings in major accounts.
  • 50
    SafeConsole Reviews

    SafeConsole

    DataLocker

    $28 per device per year
    Central Management Server Software. SecureConsole central management software gives you instant access to all your encrypted USB flash drives or portable hard drives. It allows you to instantly gain complete control over them. You can enjoy the productivity benefits of USB storage devices without worrying about malware, data leaks or breaches. Available as an on-premises or DataLocker hosted cloud service with global locations. You can enforce policies such as file type restrictions, password rules, and geographic boundaries. Reset passwords, change devices to read-only mode, or remotely wipe them in the event of theft or loss. All encrypted drives can be monitored, including their location around the globe. Integrate Active Directory to easily track users, devices and computers connected. You can see which files are being saved to and deleted from your encrypted drives at any time.