Best WALLIX Bastion Alternatives in 2024
Find the top alternatives to WALLIX Bastion currently available. Compare ratings, reviews, pricing, and features of WALLIX Bastion alternatives in 2024. Slashdot lists the best WALLIX Bastion alternatives on the market that offer competing products that are similar to WALLIX Bastion. Sort through WALLIX Bastion alternatives below to make the best choice for your needs
-
1
1Password
1Password
16,079 Ratings1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password. -
2
Keeper Security
Keeper Security
1,542 RatingsPassword security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting. -
3
Uniqkey
Uniqkey
175 RatingsUniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind. -
4
Foxpass provides access control and infrastructure identity for companies of all sizes. Our cloud-hosted and on-premise LDAP and RADIUS and SSH key management solutions ensure employees have only the networks, servers, and VPNs that they need, and only for the period requested. Foxpass can be integrated with existing products such as Office365, Okta and Bitium to provide seamless access.
-
5
Securden Unified PAM
Securden
Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards. -
6
Securden Password Vault
Securden
2 RatingsSecurden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS). -
7
Doppler
Doppler
$6 per seat per monthStop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy! -
8
AWS Secrets Manager
Amazon
$0.40 per monthAWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments. -
9
Delinea Secret Server
Delinea
Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials. -
10
Bravura Safe
Bravura Security
Bravura Safe is a zero knowledge secret and passwords manager. It centrally manages and secures decentralized passwords and secrets, so employees don't have too. It can be used in conjunction with core password management solutions already in use by organizations. Bravura Safe draws on two decades of Bravura Security enterprise cybersecurity solutions. Employees can securely send time-bound passwords to new accounts, encryption keys to files, or entire files to Bravura Secure. They don't have to be leaked or intercepted and only need one password to their BravuraSafe. Cybersecurity leaders should be concerned about the recent rise in threats of organizational insiders being paid for their assistance with cyberattacks. This is combined with a notoriously bad secret and password hygiene at an individuals level. IT teams have been focusing on strong SSO, password management and identity, but the rise of work-from-home IT has led to shadow IT. -
11
CyberArk Conjur
CyberArk
Securely authenticate, control, and audit non-human access across tools and applications. Secrets allow access to tools, critical infrastructure, and other sensitive data. Conjur protects these secrets by tightly controlling them with granular Role-Based Access Control. Conjur authenticates an application that requests access to a resource. It then checks the security policy against the authorization and distributes the secret securely. Conjur's security policy is code. Security rules are written in.yml format, checked into source control and loaded onto Conjur. Security policy is treated as any other source control asset. This adds transparency and collaboration to the organization’s security requirements. -
12
Vault One
VaultOne Software
$99 per monthYou have complete control over who has access to your data, systems and infrastructure. This will prevent cyber attacks and data breaches. VaultOne helps you to protect your company's assets and ensure compliance. VaultOne is reinventing the concept behind privileged access management (PAM). VaultOne is reinventing the concept of privileged access management (PAM). It allows you to manage user access, credentials, and sessions in a fast and secure way. We offer multiple features such as a digital vault, password generator and sessions recording, auditing, reporting, customizable policies and disaster recovery. You've found the right solution to protect shared accounts, certificates, and user access to websites, applications, servers, databases and cloud services. You can prevent data breaches by creating custom access policies and managing privileges. -
13
Strongbox
Strongbox
$2.49 per monthStrongbox offers best-in-class secure password management to help you keep your data private. You are protected from digital attacks using industry-standard formats, military-grade cryptography, and recognized best practices. Strongbox provides a beautiful native experience for iPhones, iPads, and Macs. The ultimate KeePass iOS password manager. Strongbox is an iOS and MacOS native app. It looks and feels exactly like an App should. Strongbox is natively designed with Apple's human interface guidelines and standard UI controls, colours, and integrations in mind. AutoFill integration makes it easy to use Safari or other Apps to fill out a password. Simply tap the Strongbox suggestion to the right of your keyboard and authenticate. Face ID can be used to unlock your database automatically. -
14
Secure and Protect Privileged Credentials, Sessions, and Accounts Everywhere! RevBits Privileged Access Management offers six-in-one solutions that include privileged access, privileged session and password, service accounts and key and certificate management, extensive session logging, keystrokes and video capture, and extensive session logging. Native clients for RevBits Privileged access Management are available on common operating systems. As organizations need to manage access in a more comprehensive manner, so will the number of vendors that they use. RevBits Privileged Access Management was designed to provide comprehensive access management and reduce vendor onboarding. Organizations can manage their access with five integrated modules. Product Features: Hardware Tokens Comprehensive Platform Coverage Password Management - Customizable Audit Logs - Extensive Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
-
15
Topicus KeyHub
Topicus
Topicus KeyHub provides Privileged Access Management to individuals. With privileged access management, you can gain easy and secure access containers, sensitive data, and production environments. KeyHub allows you to access your data in real-time and enforces least privilege rules. -
16
senhasegura
senhasegura
The Security department of any organization must control access to privileged accounts. This is a vector of attack in almost every invasion. It is therefore not surprising that standards like PCI DSS and ISO 27001, HIPAA and NIST, GDPR and SOX have specific requirements and controls for user accounts. PCI DSS requires companies to implement controls that assign an individual identity to every person who has access to a computer. They also need to monitor customer payment data and network resources. senhasegura improves internal controls and reports requirements for SOX compliance. It goes beyond following the rules to implement an "inside out" security approach to become part your organization's DNA. Using senhasegura, companies can implement all controls in ISO 27001 relating to the security of privileged account accounts. -
17
Devolutions Server
Devolutions
Team Edition $499.99IT teams often face difficulties managing shared credentials and accounts securely, especially when multiple users need access to the same resources. Devolutions Server (DVLS) offers a self-hosted, shared account and credential management solution that helps organizations centralize, secure, and audit their credentials. By providing role-based access controls, encryption, and audit logs, DVLS ensures that only authorized users can access critical accounts, minimizing security risks and improving compliance. In addition to core credential management, DVLS includes optional privileged access components for organizations needing enhanced control over sensitive accounts. Seamlessly integrated with Remote Desktop Manager, it allows IT professionals to manage both credentials and remote sessions securely from a single platform. With DVLS, organizations can optimize their credential management processes while maintaining the highest level of security and accountability. -
18
Keywhiz
Keywhiz
Keywhiz is a system that manages and distributes secrets. It can be used in conjunction with service-oriented architecture (SOA). Here's a brief overview in presentation format. Common practices include placing secrets in config files alongside code and copying files to servers outside-of-band. The former is more likely to be leaked, while the latter is more difficult to track. Keywhiz makes it easier and safer to manage secrets. Keywhiz servers in clusters centrally store secret information encrypted in a database. To retrieve secrets that they have access to, clients use mutually authenticated TLS(mTLS). Authenticated users administer Keywhiz via CLI. Keywhiz offers automation APIs that allow for workflows. Every organization has services and systems that require secrets. Secrets such as API tokens, GPG keys and TLS certificates/keys. Keywhiz is reliable and can be used in production. However, API backward compatibility may be broken by occasional changes. -
19
Knox
Pinterest
Knox is a secret management system. Knox allows you to store and rotate secrets, keys, passwords, and other information. Pinterest has many keys and secrets that can be used to sign cookies, encrypt data, protect our network via TLS, access our AWS machines, communicate with third parties, and many other things. Rotating (or changing) keys can be difficult if they are compromised. This usually involves a deploy and most likely a code change. Pinterest keys/secrets were stored in git repositories. These keys were stored in git repositories and copied all over the company's infrastructure. They were also present on many employees' laptops. It was impossible to audit who had access to the keys and who did not. These problems were solved by Knox. Developers can access/use confidential keys and credentials with ease. Confidentiality of secrets, keys and credentials. In the event of compromise, provide mechanisms for key rotation. -
20
Every organization should consider Secure Identity & Access Management due to the increasing number of remote workers, increased dependence on cloud applications, as well as explosive increases in cyber theft. IT teams can quickly, easily, and economically enable the right people to access the right resources using Passly™, a Kaseya company. Secure Password Management, Single Sign On, Multi-Factor authentication, and many more. It's crucial to choose the right secure identity and access management platform in a world where cyberattacks are more common than ever. Nearly 80% of all data breaches are due to weak passwords. Passly is the most cost-effective and comprehensive solution to ensure security, compliance, efficiency, and compliance. Techs can store and manage passwords for personal, business, or shared accounts using shared password vaults. It is centralized and easy-to-use
-
21
Confidant
Confidant
Lyft's Confidant is an open-source secret management service that allows users to store and access secrets in a secure manner. Confidant solves both the authentication chicken-and-egg problem by using AWS KMS, IAM to allow IAM role to generate secure authentication tokens which can be verified by Confidant. Confidant also manages KMS grant for your IAM role, which allows IAM roles to generate tokens that are used for service-to–service authentication or to transmit encrypted messages between services. Confidant stores secrets using DynamoDB in an append-only manner. It generates a unique KMS key for each revision of every secret by using Fernet symmetric authenticated encryption. Confidant offers an AngularJS web interface which allows end-users easy access to secrets, the mappings secret to services, and the history of any changes. -
22
HashiCorp Vault
HashiCorp
Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API. -
23
PassCamp is a cloud-based password management and access management tool that allows teams of any size to collaborate effectively and protect their sensitive information. The tool was created to be the best password manager for teams that rely upon efficient collaboration from the beginning. PassCamp is simple to use and onboard for anyone, even non-technical. PassCamp's main focus is on uncompromised data security. This is achieved by two-factor authentication, zero knowledge proof, and end-to-end encryption. PassCamp's unique features, such as history tracking, unlimited guests, secure multi-tier sharing, and history tracking, help thousands of teams around the globe manage their passwords in an easy-to use interface that increases security and productivity.
-
24
Delinea Cloud Suite
Delinea
User authentication to servers using any directory service such as Active Directory, LDAP and cloud directories like Okta can be simplified. With just-in-time privilege and enough privilege to minimize security breaches, enforce the principle of least privilege. Identify abuse of privilege and stop attacks. Quickly prove regulatory compliance by creating an audit trail and recording video. Delinea's cloud-based SaaS solution uses zero-trust principles to prevent privileged access abuse and lower security risks. You will enjoy elastic scalability, performance, and support for multi-VPCs, multiple-clouds, and multi-directory uses cases. Securely log in anywhere with a single enterprise identity. Flexible, just-in time model with privilege elevation Centrally manage security policies across users, machines, applications. All your business-critical and regulated systems should be consistent in applying MFA policies. You can monitor privileged sessions live and immediately terminate any suspicious sessions. -
25
BastionZero
BastionZero
$300 per monthInfrastructure teams have to manage VPNs, homegrown bastion host hosts, overprivileged certificate authorities and long-lived credentials that pose huge security risks. Infrastructure teams can easily manage and secure fine-grained access control to infrastructure targets in any cloud environment or on-prem. You only need one system to access all your targets (servers and containers, clusters of servers, databases, webservers, etc.) instead of managing a growing number of systems. You can grant zero-trust access for your targets by hiding them behind your SSO, and adding an independent MFA. Stop managing passwords. To control who can log in to which target using which user account or role, use policy. BastionZero's access logs can be used to capture the commands that users ran on targets under specific roles or accounts. -
26
Yandex Lockbox
Yandex
$0.0277 per 10000 operationsCreate secrets using the API or the management console. Your secrets are stored safely in one place and can be easily integrated with cloud services. They are also accessible by external systems via the gRPC API or REST API. Yandex Key Management Service can be used to encrypt your secrets. Secrets are only kept in encrypted form. You can select from pre-configured roles to gain granular access. Set access permissions for reading or managing your secret or its metadata. Create a secret and select a Key Management Service key to securely store your login and password pairs and other sensitive data. A secret can contain any confidential information you have, such as a login-password pair. A login-password combination, server certificate keys or cloud service account key. The service can store multiple versions of data for each secret. This data is stored in an encrypted form by the service. All secrets are replicated across three availability zones. -
27
Stealthbits Private Activity Manager provides secure, task-based administrative access that is delivered right-in-time with just enough privilege. Privilege account reduction can reduce the risk of lateral movement attacks. Stealthbits Privileged Activities Manager (SbPAM) empowers organizations to reduce their risk footprint using a task-based approach for Privileged Access Management. SbPAM gives Administrators the exact level and duration of privileges they need, at the right time, and immediately returns the environment back to an environment that does not allow access by default. SbPAM Activity Tokens can be used to grant temporary permission and access. They are auto-provisioned if needed and de-provisioned if not. This reduces your attack surface and the potential for lateral movements attacks. Access certification facilities built-in allow for unique ability to approve and deny access to SbPAM or privileged activities.
-
28
Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
-
29
Fortanix Data Security Manager
Fortanix
A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing. -
30
Delinea Server Suite
Delinea
Microsoft Active Directory allows you to consolidate multiple identities for Linux or Unix. A flexible, just in time privilege elevation model helps to reduce the risk of a security breach and minimize lateral movement. Advanced session recording, auditing, compliance reporting, and monitoring are all part of forensic analysis of privilege abuse. To facilitate identity consolidation into Active Directory, centralize discovery, management, user administration, and user administration for Linux or UNIX systems. The Server Suite makes it easy to follow best practices for privileged access management. You will see a higher level of identity assurance, a reduced attack surface, and fewer identity silos, redundant identities and local accounts. Active Directory allows you to manage privilege user and service accounts for Windows and Linux. Access control that is precise and just-in-time with RBAC or our patented Zones technology. Complete audit trail for security review and corrective action as well as compliance reporting. -
31
Finally, a password manager that is designed for collaboration. Secure, flexible, and ready for automation. Trusted by over 10,000 organizations, including Fortune 500 companies and newspapers as well as governments and military forces. Passbolt servers have been designed to be easy to set up and manage. They are enterprise-ready and can be configured to support high availability. Passbolt is available via your browser or your mobile phone. Real-time sharing is possible. Desktop apps are on the horizon. The JSON API allows you to retrieve, store, and share passwords programmatically. Automate at scale using Passbolt CLI Access logs in real-time. Privacy is part of our DNA, and also in the DNA European laws (to ensure we don't change minds). Passbolt's self-hosted source code is covered by an AGPL license. Yes, even the commercial version. It is free to be audited, contributed to, and redistributed. This is why we have thousands of organizations from all sectors.
-
32
SecureKi
SecureKi
Our unparalleled identity security is backed by zero-trust principles. This will ensure that your customers, employees, and business are protected. Passwords are the weakest link in protecting your data. Multifactor authentication is the standard for access management and identity protection to prevent unauthorized access. SecureKi verifies the identity of all users. Most security breaches are caused by compromised access and credentials. Our comprehensive privileged management system is designed to manage and monitor privileged accounts and applications, alert system administrators to high-risk events, reduce operational complexity, and comply with regulatory compliance. Privilege escalation is the heart of most cyber-attacks. -
33
PrivX
SSH Communications Security
PrivX is an automated, scalable and cost-efficient privileged access management solution (PAM) for hybrid and multicloud environments. It supports quantum-safe connections, password vaulting and rotation, as well as passwordless authentication. PrivX simplifies PAM, increases productivity, and reduces costs while reducing complexity. PrivX eliminates passwords, keys and other credentials that are left behind after access authentication. Instead, it uses ephemeral, short-lived certificates. Your privileged users and Superusers will get role-based, just-in time Zero Trust access, without having to manage, vault or rotate any secrets. PrivX supports hybrid environments, with a secret vault and password rotation as needed. It allows you to create quantum-safe SSH connection. -
34
Entro
Entro Security
Non-Human Identity & Secrets Security Platform. Entro is a pioneer in nonhuman identity management. It allows organizations to use nonhuman identities and secrets securely, while automating the lifecycle of their creation to rotation. Cyber attacks based on secrets are becoming more destructive as R&D teams create more secrets and spread them across different vaults and repositories without any real secret management, monitoring or security oversight. Streamline your non-human lifecycle management. Entro allows security teams to manage and protect non-human identities through automated lifecycle management, seamless integration and a unified interface. -
35
BastionPass
BastionWare
$1.59 per user per monthBastionPass was created out of necessity to provide a collaborative, all-encompassing platform that can be used by family and coworkers in a way that other password management solutions don't offer. Our goal has been to create a single identity management system and share capabilities using a simple interface. This makes it easy for individuals and teams to manage their passwords. BastionPass will manage your passwords for you so that you don't have to. Our plugin will automatically log you in to all other sites once you have signed in with your master password. You can easily create complex passwords for all of your logins. Keep them safe in our vault, which is triple-encrypted. Access, manage, and share passwords from your desktop or mobile device easily. BastionPass was built from the ground up to meet your digital life requirements. -
36
SecretHub
SecretHub
$99 per monthUnified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team. -
37
Seamless service account governance, from discovery through provisioning to decommissioning. Non-human privileged account access to services, applications, data and network resources. Your attack surface is increased by the fact that most service accounts are not visible to IT. Service account governance can be automated to provide central oversight and control for security teams. Service account management can be improved by increasing accountability, consistency, oversight, and oversight. Automating and streamlining service management can reduce risky service account sprawl. Get a complete view of your privileged attack surfaces and manage the risk associated with service accounts lifecycle management. Account Lifecycle Manager is a tool that helps you manage service account sprawl. It empowers to manage and control service accounts using workflows and automated provisioning and governance. Cloud-native architecture allows for rapid deployment and elastic scaling.
-
38
InPrivy
InPrivy
€30 per yearShare sensitive information easily with clients, co-workers and friends. Use InPrivy for sharing passwords and sensitive information in a safe way. Your confidential data will not be visible in chats or emails. It is important to keep your private data secure. This includes passwords, API keys and credit card information. Your data will be visible for a long period of time even if you send them via email or messengers. Use InPrivy to share your data in a secure manner. InPrivy is 100% German-made, with no ads and no excessive user tracking. We guarantee strong protection of your sensitive data. You can access the site from any device, without needing to install any apps. Only you know the link to the secret information that you created. It is your responsibility to give it to the person who needs it. These links are protected with SSL encryption and can only be used once. Strong AES256 encryption protects the secret information. -
39
Yandex Key Management Service
Yandex
$0.0230 per monthProtect your secrets, sensitive data, and personal information in the cloud with keys. Create and delete key, set access policies, perform rotation via the Management Console, CLI or API. Yandex KMS supports both symmetric and asymetric cryptography. Use the REST API or RPC to encrypt, decrypt, and sign data using eSignature schemes. Yandex KMS manages access to encrypted data while you control the physical security and reliability of keys. Hardware Security Modules are available. SDKs in Java or Go can be used to encrypt small amounts. The service integrates popular encryption libraries such as the AWS EncryptionSDK and Google Tink to encrypt large amounts of data. Yandex Lockbox integration allows you to encrypt secret data with your own keys. Managed Service for Kubernetes also allows you to protect secrets and data using encryption keys. -
40
Symantec PAM
Broadcom
Privileged accounts allow users and systems to have elevated and unrestricted access and are essential for key activities. Privileged accounts allow users and systems to have elevated and unrestricted access and are essential for key activities. They are also one of the most popular attack vectors as they allow hackers to gain access to critical systems, steal sensitive information, and execute malicious code. The privileged access management tools of today must allow you to manage privileges and users that have elevated or "privileged" rights. However, with the explosion in virtualized and cloud environments, the attack surfaces and types of privileged accounts has increased exponentially. -
41
ManageEngine Password Manager Pro
Zoho
$495 per yearPassword Manager Pro is a vault that stores and manages sensitive information, such as passwords, documents, and digital identities. Password Manager Pro has many benefits. It can be used to eliminate password fatigue and security breaches by creating a secure vault that allows for password storage and access. Automating frequent password changes in critical systems can improve IT productivity. Provide preventive and detective security controls via approval workflows and real-time alerts about password access. Security audits and regulatory compliance such a SOX, HIPAA, and PCI are met. -
42
EmpowerID
EmpowerID
$2 per user per monthEmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business. -
43
BeyondTrust Privileged Remote Access
BeyondTrust
Without a VPN, you can secure, manage, audit, and audit vendor access and internal remote privilege access. Watch demo. Allow legitimate users to access the information they need to be productive while keeping hackers out. Contractors and vendors can have privileged access without the need for a VPN. With session forensics and audit trails, you can satisfy both internal and external compliance requirements. Adopting a system that allows users to do their jobs more efficiently and effectively than today is a guarantee of adoption. Protect your IT assets by preventing "privilege creep" by quickly enforcing least privilege. Protect your data without compromising security by making least privilege productive. -
44
Your multi-vendor infrastructure can be centralized into one security domain. Core Privileged Access Manager, (BoKS), transforms multi-vendor Linux or UNIX server environments into one centrally managed security area. BoKS makes it easier for your organization to enforce security policies and control access to sensitive systems and information. IT and security teams can prevent attacks from internal and external sources on critical systems by having full control over access, privilege, and accounts. For simplified administration and scaling, centralize the management of user accounts and profiles. You can secure your systems by controlling user privileges and accessing sensitive data. This will not slow down productivity. You should limit access to users and ensure that the least privilege access is allowed in your hybrid environment.
-
45
OmniDefend
Softex
OmniDefend protects your employees, contractors, and vendors using universal single sign-on and strong authentication to secure business applications and processes. OmniDefend eliminates fraud by identifying and securing customer transactions online or in-person using multi-factor authentication. OmniDefend lets you quickly add authentication to a website, so that you can provide a password-free experience for your customers while securing e-commerce transactions. OmniDefend uses industry-proven standards when it comes to security. OmniDefend supports OpenId 2.0, OAuth 2.0 and SAML to ensure maximum compatibility and security when using single-sign-on applications. SCIM 2.0 enables OmniDefend to seamlessly integrate with identity management and user provisioning. -
46
BeyondTrust Endpoint Privilege Management
BeyondTrust
Reduce unnecessary privileges and give Windows, Mac, Unix and Linux access without affecting productivity. Our experience with more than 50 million endpoints has allowed us to develop a rapid deployment process. BeyondTrust is available on-premise and in the cloud. It allows you to quickly and efficiently remove admin rights without affecting user productivity or increasing service desk tickets. External attackers and malicious insiders are high-value targets for Unix and Linux systems. The same applies to networked devices such as IoT and ICS, as well. An attacker can gain root or other privileged credentials to easily fly under the radar and gain access to sensitive systems and data. BeyondTrust Privilege Manager for Unix & Linux provides an enterprise-class, high-standard privilege management solution that assists IT organizations in achieving compliance. -
47
You trust your privileged user with elevated access to systems, data and functions. To protect your resources against cybersecurity threats and credential misuse, you must monitor, analyze, and verify their advanced entitlements. According to research, up to 40% of insider cyberattacks involve privileged users. IBM Verify Privilege, powered by Delinea products, help enterprises minimize risk with zero-trust strategies. Discover, control, protect, and manage privileged accounts on endpoints, hybrid multi-cloud environments, and other hybrid environments. Discover unknown accounts. Automatically reset passwords Monitor unusual activity. Manage, protect, audit, and manage privileged accounts throughout their lifecycles. Identify devices, servers and other endpoints that have administrative privileges in order to enforce least-privilege, control application rights and reduce impact on the support team.
-
48
Hemmelig.app
Hemmelig.app
FreePaste a password, confidential message, or private data. Secure, confidential, and encrypted sensitive data is what you want. By default, the secret link is only available for a single use. Hemmelig, [he`m:(@)li], means secret in Norwegian. -
49
Evo Security
Evo Security
Evo Security allows you to eliminate credential sharing, set up powerful administrative permissions and mass deploy login security. It also helps you meet insurance and compliance requirements. EPIC is a next-generation solution for MSPs and MSSPs. It also provides secure logins to web applications, network devices and endpoints. The secret of managed services is that MSP administrators must share passwords and MFA codes with each other. Password Rotation Tools and Password Managers offer convenience in sharing passwords with some iterative improvement, but ultimately propagate the problem. This involuntary bad practice is no longer acceptable, as cybercriminals are targeting MSPs at an increasing rate and regulations demand a better solution. Easily accommodate scenarios where technicians and administrators require access to the Evo Platform using the Evo Privilege Access Manager. -
50
Onboardbase
Onboardbase
FreeOnboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.