Best Secrets Management Software in South America

Find and compare the best Secrets Management software in South America in 2024

Use the comparison tool below to compare the top Secrets Management software in South America on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    GitGuardian Reviews
    Top Pick

    GitGuardian

    GitGuardian

    $0
    297 Ratings
    See Software
    Learn More
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 2
    1Password Reviews
    Top Pick

    1Password

    1Password

    $3.99/month/user
    15,513 Ratings
    See Software
    Learn More
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 3
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 4
    Entropy Keycrypt Reviews
    Entropy offers a seamless, secure transition from your trusted circle to your digital assets in the event of an emergency. Security that is User-Friendly Entropy allows you to securely partition your important information into discrete share, which each do not reveal anything about your secret without the other. Distribute them to a small group of trusted people who can store them offline. Long-Term Resilience Entropy's robust security features include 256-bit encryption. This allows for decentralized, durable offline storage that protects your data against both online and offline threats.
  • 5
    Onboardbase Reviews

    Onboardbase

    Onboardbase

    Free
    Onboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.
  • 6
    Azure Key Vault Reviews
    Key Vault helps you to improve data protection and compliance To protect cloud data, secure key management is crucial. Azure Key Vault can encrypt keys and small secrets, such as passwords, that are stored in hardware security module (HSMs). You can import or generate keys in HSMs for additional security. Microsoft processes your keys using FIPS validated HSMs (hardware, firmware, and hardware) - FIPS 140-2 level 2 for vaults, and FIPS 140-2 level 3 for HSM pools. Microsoft can't see your keys or extract them with Key Vault. You can monitor and audit key usage with Azure logging-pipe logs to Azure HDInsight, or your security information management (SIEM), for more analysis and threat detection.
  • 7
    Drone Reviews
    Configuration as code. Pipelines are created with a simple, readable file that is then committed to your git repository. Each step of a pipeline is executed in a Docker container, which is automatically downloaded at runtime. Any source code manager. Drone.io seamlessly integrates with multiple source code management system, including Bitbucket and GitHubEnterprise. Any platform. Drone natively supports multiple operating system and architectures, including Linux x64/ARM/ARM64/Windows x64. Any language. Drone can communicate with any language, database, or service that runs within a Docker container. You can choose from thousands of Docker images, or create your own. Make and share plugins. Drone uses containers to drop preconfigured steps into your pipeline. You can choose from hundreds of pre-made plugins or create your own. Drone allows for advanced customization. You can create custom access controls, approve workflows, secret management, yaml syntax extension, and other features using drone.
  • 8
    AWS Secrets Manager Reviews

    AWS Secrets Manager

    Amazon

    $0.40 per month
    AWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments.
  • 9
    Strongbox Reviews

    Strongbox

    Strongbox

    $2.49 per month
    Strongbox offers best-in-class secure password management to help you keep your data private. You are protected from digital attacks using industry-standard formats, military-grade cryptography, and recognized best practices. Strongbox provides a beautiful native experience for iPhones, iPads, and Macs. The ultimate KeePass iOS password manager. Strongbox is an iOS and MacOS native app. It looks and feels exactly like an App should. Strongbox is natively designed with Apple's human interface guidelines and standard UI controls, colours, and integrations in mind. AutoFill integration makes it easy to use Safari or other Apps to fill out a password. Simply tap the Strongbox suggestion to the right of your keyboard and authenticate. Face ID can be used to unlock your database automatically.
  • 10
    SecretHub Reviews

    SecretHub

    SecretHub

    $99 per month
    Unified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team.
  • 11
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 12
    Bravura Safe Reviews

    Bravura Safe

    Bravura Security

    Bravura Safe is a zero knowledge secret and passwords manager. It centrally manages and secures decentralized passwords and secrets, so employees don't have too. It can be used in conjunction with core password management solutions already in use by organizations. Bravura Safe draws on two decades of Bravura Security enterprise cybersecurity solutions. Employees can securely send time-bound passwords to new accounts, encryption keys to files, or entire files to Bravura Secure. They don't have to be leaked or intercepted and only need one password to their BravuraSafe. Cybersecurity leaders should be concerned about the recent rise in threats of organizational insiders being paid for their assistance with cyberattacks. This is combined with a notoriously bad secret and password hygiene at an individuals level. IT teams have been focusing on strong SSO, password management and identity, but the rise of work-from-home IT has led to shadow IT.
  • 13
    Password.link Reviews

    Password.link

    Password.link

    €8.99 per month
    The link can only once be opened. This means that it cannot be opened more than once. After it has been viewed, the encrypted secret is deleted automatically from our database. It is impossible to view it again. Leaving secrets in plain text exposes them even to threats long after the message is gone. A one-time link is a way to ensure that there are no valid credentials in email inboxes, or archived instant messages. The link contains half of the encryption key and is never shared with anyone. Without the original link, it is impossible to view the secret. You can use our service to create a unique link to the credentials. This will ensure that no one sees them except the recipient. You can also set up notifications to be sent via various channels so that you know when credentials have been viewed and by whom.
  • 14
    InPrivy Reviews

    InPrivy

    InPrivy

    €30 per year
    Share sensitive information easily with clients, co-workers and friends. Use InPrivy for sharing passwords and sensitive information in a safe way. Your confidential data will not be visible in chats or emails. It is important to keep your private data secure. This includes passwords, API keys and credit card information. Your data will be visible for a long period of time even if you send them via email or messengers. Use InPrivy to share your data in a secure manner. InPrivy is 100% German-made, with no ads and no excessive user tracking. We guarantee strong protection of your sensitive data. You can access the site from any device, without needing to install any apps. Only you know the link to the secret information that you created. It is your responsibility to give it to the person who needs it. These links are protected with SSL encryption and can only be used once. Strong AES256 encryption protects the secret information.
  • 15
    Hemmelig.app Reviews

    Hemmelig.app

    Hemmelig.app

    Free
    Paste a password, confidential message, or private data. Secure, confidential, and encrypted sensitive data is what you want. By default, the secret link is only available for a single use. Hemmelig, [he`m:(@)li], means secret in Norwegian.
  • 16
    Yandex Key Management Service Reviews
    Protect your secrets, sensitive data, and personal information in the cloud with keys. Create and delete key, set access policies, perform rotation via the Management Console, CLI or API. Yandex KMS supports both symmetric and asymetric cryptography. Use the REST API or RPC to encrypt, decrypt, and sign data using eSignature schemes. Yandex KMS manages access to encrypted data while you control the physical security and reliability of keys. Hardware Security Modules are available. SDKs in Java or Go can be used to encrypt small amounts. The service integrates popular encryption libraries such as the AWS EncryptionSDK and Google Tink to encrypt large amounts of data. Yandex Lockbox integration allows you to encrypt secret data with your own keys. Managed Service for Kubernetes also allows you to protect secrets and data using encryption keys.
  • 17
    Yandex Lockbox Reviews

    Yandex Lockbox

    Yandex

    $0.0277 per 10000 operations
    Create secrets using the API or the management console. Your secrets are stored safely in one place and can be easily integrated with cloud services. They are also accessible by external systems via the gRPC API or REST API. Yandex Key Management Service can be used to encrypt your secrets. Secrets are only kept in encrypted form. You can select from pre-configured roles to gain granular access. Set access permissions for reading or managing your secret or its metadata. Create a secret and select a Key Management Service key to securely store your login and password pairs and other sensitive data. A secret can contain any confidential information you have, such as a login-password pair. A login-password combination, server certificate keys or cloud service account key. The service can store multiple versions of data for each secret. This data is stored in an encrypted form by the service. All secrets are replicated across three availability zones.
  • 18
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • 19
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 20
    Keywhiz Reviews
    Keywhiz is a system that manages and distributes secrets. It can be used in conjunction with service-oriented architecture (SOA). Here's a brief overview in presentation format. Common practices include placing secrets in config files alongside code and copying files to servers outside-of-band. The former is more likely to be leaked, while the latter is more difficult to track. Keywhiz makes it easier and safer to manage secrets. Keywhiz servers in clusters centrally store secret information encrypted in a database. To retrieve secrets that they have access to, clients use mutually authenticated TLS(mTLS). Authenticated users administer Keywhiz via CLI. Keywhiz offers automation APIs that allow for workflows. Every organization has services and systems that require secrets. Secrets such as API tokens, GPG keys and TLS certificates/keys. Keywhiz is reliable and can be used in production. However, API backward compatibility may be broken by occasional changes.
  • 21
    Knox Reviews

    Knox

    Pinterest

    Knox is a secret management system. Knox allows you to store and rotate secrets, keys, passwords, and other information. Pinterest has many keys and secrets that can be used to sign cookies, encrypt data, protect our network via TLS, access our AWS machines, communicate with third parties, and many other things. Rotating (or changing) keys can be difficult if they are compromised. This usually involves a deploy and most likely a code change. Pinterest keys/secrets were stored in git repositories. These keys were stored in git repositories and copied all over the company's infrastructure. They were also present on many employees' laptops. It was impossible to audit who had access to the keys and who did not. These problems were solved by Knox. Developers can access/use confidential keys and credentials with ease. Confidentiality of secrets, keys and credentials. In the event of compromise, provide mechanisms for key rotation.
  • 22
    Delinea Secret Server Reviews
    Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials.
  • 23
    Infisical Reviews

    Infisical

    Infisical

    $6 per month
    Compare secrets between environments to see what is different or missing. Set personal values to secrets, either for sensitive secrets or during local development. You can easily inherit other secrets in order to establish a single truth. Infisical’s continuous monitoring and pre commit checks can be used to automatically identify and prevent leaks of secrets into git. Support for over 140 secret types.
  • 24
    Password Pusher Reviews

    Password Pusher

    Password Pusher

    Free
    Password Pusher allows you to securely share passwords and sensitive information. Password Pusher allows you to create a unique URL that expires after a specified time period or after the URL has been accessed for a specific number of times. This ensures that your information is private and secure. Individuals and organizations use it to share login credentials with clients, partners, or colleagues. Password Pusher allows you to securely share passwords with others without having to use email or any other less secure methods of communication.
  • 25
    Fortanix Data Security Manager Reviews
    A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing.
  • Previous
  • You're on page 1
  • 2
  • Next