Best Yandex Lockbox Alternatives in 2025

Find the top alternatives to Yandex Lockbox currently available. Compare ratings, reviews, pricing, and features of Yandex Lockbox alternatives in 2025. Slashdot lists the best Yandex Lockbox alternatives on the market that offer competing products that are similar to Yandex Lockbox. Sort through Yandex Lockbox alternatives below to make the best choice for your needs

  • 1
    1Password Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 2
    Keeper Security Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 3
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 4
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 5
    Securden Password Vault Reviews
    Securden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS).
  • 6
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 7
    AWS Secrets Manager Reviews
    AWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments.
  • 8
    Yandex Key Management Service Reviews
    Protect your secrets, sensitive data, and personal information in the cloud with keys. Create and delete key, set access policies, perform rotation via the Management Console, CLI or API. Yandex KMS supports both symmetric and asymetric cryptography. Use the REST API or RPC to encrypt, decrypt, and sign data using eSignature schemes. Yandex KMS manages access to encrypted data while you control the physical security and reliability of keys. Hardware Security Modules are available. SDKs in Java or Go can be used to encrypt small amounts. The service integrates popular encryption libraries such as the AWS EncryptionSDK and Google Tink to encrypt large amounts of data. Yandex Lockbox integration allows you to encrypt secret data with your own keys. Managed Service for Kubernetes also allows you to protect secrets and data using encryption keys.
  • 9
    SecretHub Reviews

    SecretHub

    SecretHub

    $99 per month
    Unified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team.
  • 10
    Knox Reviews
    Knox is a secret management system. Knox allows you to store and rotate secrets, keys, passwords, and other information. Pinterest has many keys and secrets that can be used to sign cookies, encrypt data, protect our network via TLS, access our AWS machines, communicate with third parties, and many other things. Rotating (or changing) keys can be difficult if they are compromised. This usually involves a deploy and most likely a code change. Pinterest keys/secrets were stored in git repositories. These keys were stored in git repositories and copied all over the company's infrastructure. They were also present on many employees' laptops. It was impossible to audit who had access to the keys and who did not. These problems were solved by Knox. Developers can access/use confidential keys and credentials with ease. Confidentiality of secrets, keys and credentials. In the event of compromise, provide mechanisms for key rotation.
  • 11
    Hemmelig.app Reviews
    Paste a password, confidential message, or private data. Secure, confidential, and encrypted sensitive data is what you want. By default, the secret link is only available for a single use. Hemmelig, [he`m:(@)li], means secret in Norwegian.
  • 12
    Confidant Reviews
    Lyft's Confidant is an open-source secret management service that allows users to store and access secrets in a secure manner. Confidant solves both the authentication chicken-and-egg problem by using AWS KMS, IAM to allow IAM role to generate secure authentication tokens which can be verified by Confidant. Confidant also manages KMS grant for your IAM role, which allows IAM roles to generate tokens that are used for service-to–service authentication or to transmit encrypted messages between services. Confidant stores secrets using DynamoDB in an append-only manner. It generates a unique KMS key for each revision of every secret by using Fernet symmetric authenticated encryption. Confidant offers an AngularJS web interface which allows end-users easy access to secrets, the mappings secret to services, and the history of any changes.
  • 13
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 14
    Keywhiz Reviews
    Keywhiz is a system that manages and distributes secrets. It can be used in conjunction with service-oriented architecture (SOA). Here's a brief overview in presentation format. Common practices include placing secrets in config files alongside code and copying files to servers outside-of-band. The former is more likely to be leaked, while the latter is more difficult to track. Keywhiz makes it easier and safer to manage secrets. Keywhiz servers in clusters centrally store secret information encrypted in a database. To retrieve secrets that they have access to, clients use mutually authenticated TLS(mTLS). Authenticated users administer Keywhiz via CLI. Keywhiz offers automation APIs that allow for workflows. Every organization has services and systems that require secrets. Secrets such as API tokens, GPG keys and TLS certificates/keys. Keywhiz is reliable and can be used in production. However, API backward compatibility may be broken by occasional changes.
  • 15
    Azure Key Vault Reviews
    Key Vault helps you to improve data protection and compliance To protect cloud data, secure key management is crucial. Azure Key Vault can encrypt keys and small secrets, such as passwords, that are stored in hardware security module (HSMs). You can import or generate keys in HSMs for additional security. Microsoft processes your keys using FIPS validated HSMs (hardware, firmware, and hardware) - FIPS 140-2 level 2 for vaults, and FIPS 140-2 level 3 for HSM pools. Microsoft can't see your keys or extract them with Key Vault. You can monitor and audit key usage with Azure logging-pipe logs to Azure HDInsight, or your security information management (SIEM), for more analysis and threat detection.
  • 16
    InPrivy Reviews

    InPrivy

    InPrivy

    €30 per year
    Share sensitive information easily with clients, co-workers and friends. Use InPrivy for sharing passwords and sensitive information in a safe way. Your confidential data will not be visible in chats or emails. It is important to keep your private data secure. This includes passwords, API keys and credit card information. Your data will be visible for a long period of time even if you send them via email or messengers. Use InPrivy to share your data in a secure manner. InPrivy is 100% German-made, with no ads and no excessive user tracking. We guarantee strong protection of your sensitive data. You can access the site from any device, without needing to install any apps. Only you know the link to the secret information that you created. It is your responsibility to give it to the person who needs it. These links are protected with SSL encryption and can only be used once. Strong AES256 encryption protects the secret information.
  • 17
    CyberArk Conjur Reviews
    Securely authenticate, control, and audit non-human access across tools and applications. Secrets allow access to tools, critical infrastructure, and other sensitive data. Conjur protects these secrets by tightly controlling them with granular Role-Based Access Control. Conjur authenticates an application that requests access to a resource. It then checks the security policy against the authorization and distributes the secret securely. Conjur's security policy is code. Security rules are written in.yml format, checked into source control and loaded onto Conjur. Security policy is treated as any other source control asset. This adds transparency and collaboration to the organization’s security requirements.
  • 18
    Delinea Secret Server Reviews
    Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials.
  • 19
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • 20
    Bravura Safe Reviews
    Bravura Safe is a zero knowledge secret and passwords manager. It centrally manages and secures decentralized passwords and secrets, so employees don't have too. It can be used in conjunction with core password management solutions already in use by organizations. Bravura Safe draws on two decades of Bravura Security enterprise cybersecurity solutions. Employees can securely send time-bound passwords to new accounts, encryption keys to files, or entire files to Bravura Secure. They don't have to be leaked or intercepted and only need one password to their BravuraSafe. Cybersecurity leaders should be concerned about the recent rise in threats of organizational insiders being paid for their assistance with cyberattacks. This is combined with a notoriously bad secret and password hygiene at an individuals level. IT teams have been focusing on strong SSO, password management and identity, but the rise of work-from-home IT has led to shadow IT.
  • 21
    Pulumi Reviews
    Modern Infrastructure as Code. Use familiar programming languages and tools to create, deploy, manage, and monitor infrastructure in any cloud. One workflow for many clouds. On any cloud, you can use the same language, tools, or workflow. Collaborate. Harmonize your engineering practices among developers and operators. Easy continuous delivery. You can deploy from the CLI or integrate with your favorite CI/CD software. All changes are reviewed before they are made. Reduce complexity. Get visibility across all your environments. Audit and secure. Know who made changes to what, when and why. With your identity provider of choice, enforce deployment policies. Secrets management. Secure secrets with an easy-to-use encrypted configuration Familiar programming languages. You can define infrastructure in JavaScript or TypeScript, Python, Go or any other.NET language including C#, F# and VB. Use your favorite tools. Use familiar IDEs and test frameworks. Reuse and share. Codify best practices.
  • 22
    Drone Reviews
    Configuration as code. Pipelines are created with a simple, readable file that is then committed to your git repository. Each step of a pipeline is executed in a Docker container, which is automatically downloaded at runtime. Any source code manager. Drone.io seamlessly integrates with multiple source code management system, including Bitbucket and GitHubEnterprise. Any platform. Drone natively supports multiple operating system and architectures, including Linux x64/ARM/ARM64/Windows x64. Any language. Drone can communicate with any language, database, or service that runs within a Docker container. You can choose from thousands of Docker images, or create your own. Make and share plugins. Drone uses containers to drop preconfigured steps into your pipeline. You can choose from hundreds of pre-made plugins or create your own. Drone allows for advanced customization. You can create custom access controls, approve workflows, secret management, yaml syntax extension, and other features using drone.
  • 23
    Password Pusher Reviews
    Password Pusher allows you to securely share passwords and sensitive information. Password Pusher allows you to create a unique URL that expires after a specified time period or after the URL has been accessed for a specific number of times. This ensures that your information is private and secure. Individuals and organizations use it to share login credentials with clients, partners, or colleagues. Password Pusher allows you to securely share passwords with others without having to use email or any other less secure methods of communication.
  • 24
    Password.link Reviews

    Password.link

    Password.link

    €8.99 per month
    The link can only once be opened. This means that it cannot be opened more than once. After it has been viewed, the encrypted secret is deleted automatically from our database. It is impossible to view it again. Leaving secrets in plain text exposes them even to threats long after the message is gone. A one-time link is a way to ensure that there are no valid credentials in email inboxes, or archived instant messages. The link contains half of the encryption key and is never shared with anyone. Without the original link, it is impossible to view the secret. You can use our service to create a unique link to the credentials. This will ensure that no one sees them except the recipient. You can also set up notifications to be sent via various channels so that you know when credentials have been viewed and by whom.
  • 25
    Strongbox Reviews

    Strongbox

    Strongbox

    $2.49 per month
    Strongbox offers best-in-class secure password management to help you keep your data private. You are protected from digital attacks using industry-standard formats, military-grade cryptography, and recognized best practices. Strongbox provides a beautiful native experience for iPhones, iPads, and Macs. The ultimate KeePass iOS password manager. Strongbox is an iOS and MacOS native app. It looks and feels exactly like an App should. Strongbox is natively designed with Apple's human interface guidelines and standard UI controls, colours, and integrations in mind. AutoFill integration makes it easy to use Safari or other Apps to fill out a password. Simply tap the Strongbox suggestion to the right of your keyboard and authenticate. Face ID can be used to unlock your database automatically.
  • 26
    Entropy Keycrypt Reviews
    Entropy offers a seamless, secure transition from your trusted circle to your digital assets in the event of an emergency. Security that is User-Friendly Entropy allows you to securely partition your important information into discrete share, which each do not reveal anything about your secret without the other. Distribute them to a small group of trusted people who can store them offline. Long-Term Resilience Entropy's robust security features include 256-bit encryption. This allows for decentralized, durable offline storage that protects your data against both online and offline threats.
  • 27
    Onboardbase Reviews
    Onboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.
  • 28
    Entro Reviews
    Non-Human Identity & Secrets Security Platform. Entro is a pioneer in nonhuman identity management. It allows organizations to use nonhuman identities and secrets securely, while automating the lifecycle of their creation to rotation. Cyber attacks based on secrets are becoming more destructive as R&D teams create more secrets and spread them across different vaults and repositories without any real secret management, monitoring or security oversight. Streamline your non-human lifecycle management. Entro allows security teams to manage and protect non-human identities through automated lifecycle management, seamless integration and a unified interface.
  • 29
    Fortanix Data Security Manager Reviews
    A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing.
  • 30
    Infisical Reviews

    Infisical

    Infisical

    $6 per month
    Compare secrets between environments to see what is different or missing. Set personal values to secrets, either for sensitive secrets or during local development. You can easily inherit other secrets in order to establish a single truth. Infisical’s continuous monitoring and pre commit checks can be used to automatically identify and prevent leaks of secrets into git. Support for over 140 secret types.
  • 31
    east-tec InvisibleSecrets Reviews
    east-tec InvisibleSecrets, a revolutionary file encryption and steganography software, allows you to encrypt files and folder structures containing confidential data. It also gives you the ability to hide files making them invisible to anyone. Use east-tec InvisibleSecrets to encrypt and hide file contents. It is a complete privacy and encryption software solution. We will also discuss other useful features such as password manager, file shredder, and program lock. east-tec InvisibleSecrets, a file encryption program, helps you protect your confidential data from prying eyes and unwanted access. It encrypts file or folder structures on your computer. It features strong file encryption algorithms that provide privacy protection. Protect files and sensitive information by hiding them.
  • 32
    Akeyless Vault Reviews
    Secure vaults allow you to automate and protect access to credentials, keys and tokens across your DevOps tools, Cloud platforms, and API-Keys using your Cloud platforms.
  • 33
    Password Scale Reviews
    You can solve the frustrations of your team when it comes to managing passwords by logging in to a Slack Group. Securely store the passwords of the team encrypted and in a safe storage. This will reduce the risk of password compromises if passwords are stored in multiple places or insecure places. We document the encryption design and publish the entire source code. This allows code reviews to be conducted and checks the zero-knowledge protocol. This link expires in 15 mins. To make the secret unreachable, it is necessary to delete the entire file manually from the s3 password store. It is necessary to only once set up the password storage. This link expires in 15 mins. For instructions on setting up your password server, visit our GitHub project. You can also try the command on your Slack group using our test server.
  • 34
    senhasegura Reviews
    The Security department of any organization must control access to privileged accounts. This is a vector of attack in almost every invasion. It is therefore not surprising that standards like PCI DSS and ISO 27001, HIPAA and NIST, GDPR and SOX have specific requirements and controls for user accounts. PCI DSS requires companies to implement controls that assign an individual identity to every person who has access to a computer. They also need to monitor customer payment data and network resources. senhasegura improves internal controls and reports requirements for SOX compliance. It goes beyond following the rules to implement an "inside out" security approach to become part your organization's DNA. Using senhasegura, companies can implement all controls in ISO 27001 relating to the security of privileged account accounts.
  • 35
    Cyqur Reviews

    Cyqur

    Binarii Labs

    €15 one-time payment
    The Cyqur extension for the browser allows you to control where your seed phrases and passwords are stored. Cyqur fragments and distributes data to wherever you choose, ensuring unprecedented security. You are always the owner and controller of your data. The security process is completed by adding the blockchain proof of record. Data is stored in encrypted pieces across multiple cloud providers, so that if data is hacked, it will be incomplete and useless. Multi-cloud data sovereignty. Automated seed word protection. Blockchain-based proof of records. Customizable MFA. Direct personal customer support. Store up to 50 text-based secrets (e.g. notes, PINs and secret phrases, banking credentials or MFA backup codes). Secrets are fragmented and encrypted in three different cloud locations to enhance security. MFA customization options for enhanced log-on authentication.
  • 36
    PassVult Reviews
    PassVult is an intuitive password manager for iPhone. PassVult's main purpose is to give users back control of their password data. It does this by locating all data on an individual iDevice. This makes it possible to protect yourself from vendor breaches and other password managers. Securely store and manage sensitive questions and answers. Manage and store physical codes. Manage your credit cards. Randomly generate complex, secure passwords for your accounts. All this data is stored in an encrypted local database that is AES-encrypted. You can password protect all of these features with a master key. In app web browser. Touch ID and Face ID. All your secrets can be exported. PassVult is the best password storage app for people who value privacy and security. All your data is kept local to your device. We will never share any of your personal information over the internet or the cloud.
  • 37
    Evo Security Reviews
    Evo Security allows you to eliminate credential sharing, set up powerful administrative permissions and mass deploy login security. It also helps you meet insurance and compliance requirements. EPIC is a next-generation solution for MSPs and MSSPs. It also provides secure logins to web applications, network devices and endpoints. The secret of managed services is that MSP administrators must share passwords and MFA codes with each other. Password Rotation Tools and Password Managers offer convenience in sharing passwords with some iterative improvement, but ultimately propagate the problem. This involuntary bad practice is no longer acceptable, as cybercriminals are targeting MSPs at an increasing rate and regulations demand a better solution. Easily accommodate scenarios where technicians and administrators require access to the Evo Platform using the Evo Privilege Access Manager.
  • 38
    NuCypher Reviews
    Manage secrets such IAM tokens and database credentials, as well as signing/encryption keys in dynamic environments. Access to sensitive data can be granted or revoked to an unlimited number of recipients. Encrypt data while protecting the confidentiality of the inputs. NuCypher's PRE network offers cryptographic access controls for distributed protocols and apps. NuCypher's NuFHE library allows secure, private computation on encrypted information by outsourced nodes. Fully Homomorphic Encryption is a type of encryption that allows for arbitrary, secure computations on encrypted data. This means that encrypted data can be processed without having to decrypt it first. The operations on encrypted data are performed as if they were being done on plaintext data.
  • 39
    ShareSecret Reviews
    Auto-redaction of sensitive information, encryption data sharing, and self-destructing private conversations are all possible. You can share passwords, private keys and API tokens with complete peace of mind. All data stored in our short-term vault are encrypted at rest using AES256 encryption. Our system does not store keys. Once secrets expire, they are completely deleted from our system. There are no traceable items in our vault, logs or chat. ShareSecret will erase all data within 24 hours or up to 7 days. All data is encrypted at rest using industry-standard 256 bit AES encryption in our short term vault. API tokens, passwords, private keys and credit cards are all protected by our short-term vault. All data encrypted at rest. Securely share sensitive documents such as PDFs, zip files and powerpoint / keynote presentations. Slack's bot makes it easy for you to share sensitive data without compromising security.
  • 40
    KodeFile Reviews
    The most difficult part of encryption is securing the encryption keys. Until now! KodeFile's Key On Demand Encryption, (KODE), generates and stores a unique Key for each file you encrypt. Your Confidants can then decrypt the keys by sharing the secret keys on demand. KodeFile does not have access to your files. You can store and share files separately (emails, cloud, flash drives, etc.). You are in complete control of your privacy. KodeFile creates and stores a unique key to each file you encrypt. Any key can be shared on demand. The keys are kept secret for everyone so they can't be shared with anyone.
  • 41
    Conjurers Encrypter Reviews
    Conjurers Encrypter 4 (or simply CE 4) is a powerful, yet simple-to-use freeware file encryption utility. It can be used to quickly encrypt files and folders and protect your confidential and important data. Encryption refers to the process of encoding information so it cannot be accessed by others without the secret key. While encryption is used to protect sensitive documents and information, encryption can also be used to prevent people from viewing your personal data. It is possible to send important files over the internet after encrypting them. This eliminates the possibility of the contents being seen by anyone other than the recipient, even bypassing attacks such as Network Sniffing.
  • 42
    Padloc Reviews

    Padloc

    Padloc

    $3.49 per month
    Not only are passwords sensitive information that we deal with in our digital lives, but so is secret notes and license keys. Padloc allows you to store any type of data, including credit card details, license keys, secret notes, license keys, and other sensitive documents. Your data is encrypted from the beginning to ensure that no one can read it. You can share your passwords with family, friends, or colleagues. No problem! Padloc makes it easy for you to share and manage sensitive data within your family, your business, or any other type of organization. Trust is built on transparency and openness. Padloc is being developed completely openly. The source code is available under an open-source license, so anyone can view it, give feedback, or even make contributions at any time.
  • 43
    SEMYOU Password Reviews
    You can control what everyone sees and shares. You can also easily delegate management tasks. sem.Password saves everything, keeps it safe, signs you in to your favorite sites automatically with one click. To see how employees use sem.Password at workplace, get detailed usage reports. Don't forget your passwords. Your bank account routing number. Or your house's alarm code. They are all kept safe by sem.PASSWORD. Everything, from online accounts to social insurance numbers, can be stored. You can quickly find what you need on any device using tags and powerful search. Your data is secured behind your unique Master Password, which you only know. Your sensitive information is protected by strong AES256 encryption. Your data is encrypted every time you use sem.Password before it leaves your devices. Your Master Password protects your encryption keys, so only you can unlock them.
  • 44
    PrivX Reviews

    PrivX

    SSH Communications Security

    PrivX is an automated, scalable and cost-efficient privileged access management solution (PAM) for hybrid and multicloud environments. It supports quantum-safe connections, password vaulting and rotation, as well as passwordless authentication. PrivX simplifies PAM, increases productivity, and reduces costs while reducing complexity. PrivX eliminates passwords, keys and other credentials that are left behind after access authentication. Instead, it uses ephemeral, short-lived certificates. Your privileged users and Superusers will get role-based, just-in time Zero Trust access, without having to manage, vault or rotate any secrets. PrivX supports hybrid environments, with a secret vault and password rotation as needed. It allows you to create quantum-safe SSH connection.
  • 45
    ginlo Reviews

    ginlo

    ginlo.net

    $3.00/year/user
    Ginlo makes it easier and safer to stay in touch with others. With clients, employees, patients, students, etc. Fully encrypted data security, GDPR compliant - even if your device gets lost or stolen. Central user management, stronger protection against malware. We have the right solution for you in ginlo Business or ginlo Private when it comes to protecting your privacy. You can stay connected while working on confidential documents, sharing them securely, and protecting them simultaneously. This is ginlo Business and ginlo data. You can now access everything you need from one source, whether it's secret planning documents, due diligence, or any other highly sensitive information. ginlo Business Messenger is the perfect solution for your church, school, medical practice, or childcare center. It enables you to bring together all your business communications in one place.
  • 46
    TruffleHog Reviews
    TruffleHog scans your environment for secrets such as credentials and private keys. This allows you to protect your data from being compromised. Secrets can be found everywhere, so TruffleHog scans all code repositories. You can protect your secrets across all your environments with the support for custom integrations. TruffleHog was developed by a team of career security specialists. Security is our primary concern and passion. All features are designed with the best practices in mind. TruffleHog allows you to track and manage secrets through our intuitive management interface. It also provides links to where secrets were found. Secure OAuth workflows allow users to authenticate and you won't have to worry about password and username breaches.
  • 47
    Labmin Reviews
    Labmin Laboratory Information Management System is a system designed to support modern Laboratory operations. It offers key features to improve workflow and allows laboratories to store and access data on the system. Our secret is (SAAS) software as a service. Cloud Based Level 4 Solution. With ELS and mobile applications. Portals for clients and practitioners are also available. Full ISO 17025 Quality Assurance Software. This is the full auditing solution. Linked to Labmin Lims is qualityassurance17025.com
  • 48
    Zama Reviews
    Allowing healthcare providers to share confidential, secure data will improve patient care and maintain privacy. Facilitate secure financial analysis for fraud detection and risk management, while keeping client information encrypted. In the post-cookie age, create targeted advertising and campaign insights while ensuring user privacy with encrypted data analysis. Enable data sharing between agencies while maintaining confidentiality, improving efficiency and data security without revealing secrets. Allow users to create authentication applications without revealing their identities. Allow governments to create digital versions of their services, without having to rely on cloud providers.
  • 49
    SlashID Reviews
    Identity is a common vector of lateral movement and data breaches. SlashID helps build a compliant, secure, and scalable infrastructure for identity. Manage the creation, rotation, and deletion of identities and secret in one place. Multi-cloud inventory of all identities and secrets. Detect initial access, privilege elevation, and lateral movements across your IdPs, cloud environments. Add authentication, authorization and conditional access to your services. Rotate key materials to detect leaks in real-time. This will prevent data breaches. To reduce the impact of an attacker, you can automatically block, suspend or rotate MFA based on a detection. Add MFA and conditional accessibility to your applications. Add authentication, authorization and credential tokenization to your APIs and workloads.
  • 50
    Track-IT Reviews
    Track-IT™, ATSER's web-based project management solution, allows owners, contractors, and other service providers to store and categorize any information related to any project. Track-IT™, when a new contract is created within the Construct IT™, module, will automatically create a file structure that can be used to archive documents as soon as they are created. Administrators, engineers, project managers, and directors can further customize this library of information by creating additional folders or sub-folders. ATSER®, can customize the library to meet client requirements. Systems integration support is another feature that allows you to create the business logic and workflow requirements that meet your specific needs. Web-based technology also offers Internet security through individual login/passwords. These passwords define roles, responsibilities, editing, and access rights.