|
Description | HashiCorp Vault securely controls, protects, and secures access to passwords, certificates, tokens, encryption keys for secrets and other user-sensitive data using a UI, CLI or HTTP API. It uses a dynamic infrastructure, which has multiple clouds and private data centers without a clear network perimeter. Vault is API driven, it enables automation and CI/CD use cases while allowing the policy to protect, codify, and govern access to secrets. Value-added features of this infrastructure are low trust networks in public clouds, unknown network perimeter across clouds, and security enforced by identity. It tightly controls access to encryption keys and secrets by authenticating against trusted sources of identity such as Active Directory, CloudFoundry, LDAP, Kubernetes, and cloud platforms. Users can leverage any trusted identity provider such as cloud IAM platforms, Active Directory, Kubernetes or authenticate Vault. HashiCorp Vault enables fine-grained authorization to secrets and encryption keys that users and applications are permitted access to keys and secrets. Read more | Secure attack surface with continuous asset discovery and attack path analysis. Reduce risk, triage incidents, and prioritize vulnerability findings with greater clarity and 85% fewer SecOps resources. As cloud expands, so does threat landscape. To stay secure, need to understand all of cyber assets. Context into cyber assets becomes the foundation for cloud security posture, asset management, incident response, SecOps, compliance, vulnerability management, and more. Read more |
Pricing Options |
|
|
Organization Types Supported |
|
|
Platforms Supported |
|
|
Modes of Support |
|
|
API Support |
|
|
User Rating |
|
|
Rating Distribution |
|
|
User Sentiments |
Secure Secret Storage, Extensive Integrations, Dynamic Secrets Generation, Strong Security Measures Complex Initial Setup, Steep Learning Curve, Subpar User Interface, Lack of Comprehensive Documentation |
Not Available
|
Review Summary |
Reviewers acknowledge HashiCorp Vault's efficacy in safeguarding sensitive data, commending its strong encryption capabilities and adherence to industry security standards. The centralized management of secrets and ease of access controls are lauded for streamlining security processes and enhancing operational efficiency. However, concerns are raised regarding the complexity of setup and configuration, necessitating expert knowledge for optimal utilization. Additionally, the pricing structure is mentioned as a potential obstacle for resource-constrained organizations. |
Not Available
|
Read All User Reviews | Read All User Reviews |
AI-Generated from the text of User Reviews
Pricing Options |
|
|
Pricing Plans
Monthly Plans
Annual Plans
|
Open Source Others Cloud $0.03 $0.03 Per Hour Enterprise Custom |
JupiterOne Others |
View Detailed Pricing
|
View Detailed Pricing
|
![]() ![]() ![]() ![]() ![]() |
![]() ![]()
CyCognito
4.3 Based on 3 Ratings ![]()
Threatwatch
4.9 Based on 10 Ratings ![]()
DisruptOps
5 Based on 3 Ratings |
|
Videos |
![]()
+ 1 More
|
![]()
+ 1 More
|
Company Details | Located in: San Francisco, California Founded in: 2012 | Located in: Morrisville, North Carolina |
Contact Details |
Not available |
Not available |
Social Media Handles |
Not available |
|
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.