Browse Software
List Your Product
Loading...
Refine Results Clear All
Starting Price
  • (4)
  • (1)
Deployment
  • (4)
  • (3)
  • (18)
  • (1)
  • (1)
Customer Types
  • (2)
  • (1)
  • (17)
  • (18)
  • (18)
Pricing Model
  • (6)
  • (5)
  • (1)
  • (8)
  • (16)
Integrated With
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 1 - 19 of 19 Products

Top 5 NetLib Security Encryptonizer Key Manager Alternatives

Alliance Key Manager logo
Centralized Encryption Key Management Server 4.8 Based on 4 Ratings
Visit Website + Add to Compare

What is Alliance Key Manager and how does it work?

Alliance Key Manager is a solution that provides Enterprise customers, OEMs, and ISVs with a secure method of managing encryption keys for their data security applications.

Alliance Key Manager Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
EnvKey logo
End to End Encrypted Configuration Software 5 Based on 1 Ratings
Visit Website + Add to Compare

What is EnvKey and how does it work?

EnvKey - Smart configuration and secrets management that doesn't trust servers. Prevent insecure sharing and config sprawl. Integrate in minutes.

EnvKey Pricing

  • Free Trial Available
  • Starts at $20.00. Offers Custom plan.
Visit Website
ManageEngine Key Manager Plus logo
Accelerate security of your mobile devices with ManageEngine Key Manager Plus 5 Based on 3 Ratings
Visit Website + Add to Compare

What is ManageEngine Key Manager Plus and how does it work?

ManageEngine Key Manager Plus is an online key management portal that helps individuals to consolidate, manage, control, monitor and audit the entire lifecycle of SSH (Secure Shell) and SSL (Secure Sockets Layer) certificates. Furthermore, it provides visibility into the SSH and SSL environments besides helping administrators take control of the keys to preempt compliance issues and breaches. ManageEngine Key Manager Plus has been well-designed to discover all the SSL certificates deployed in the network. It provides a centralised inventory that consolidates all discovered certificates in a secure environment. Furthermore, ManageEngine Key Manager Plus helps administrators discover SSH systems in the network and private keys. One can also deploy newly acquired certificates to their respective domain servers with the help of this platform. It further helps individuals to create key pairs associated with users and deploy them on target systems. By using ManageEngine Key Manager Plus, individuals can rotate key pairs automatically at periodic intervals.

Read more

ManageEngine Key Manager Plus Pricing

  • Free Trial Available
  • Starts at $475.00. Offers Free-forever plan.
Visit Website
IronKey EMS logo
Secure & Advanced Storage Management Console 4 Based on 1 Ratings
Visit Website + Add to Compare

What is IronKey EMS and how does it work?

IronKey EMS helps to quickly and easily establish a secure storage command center for administering and policing the use of IronKey Enterprise encrypted flash drives, DataLocker Enterprise encrypted hard drives, and DataLocker Sentry EMS or Sentry ONE encrypted flash drives through this advanced management console. Securely manage all of your organization’s IronKey enterprise secure storage devices and DataLocker or Sentry ONE secure storage devices with cloud-based or on-premises management.

Read more

IronKey EMS Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

73% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Cyclonis Password Manager logo
Get multiple passwords stored and monitored within a centralized location Write a Review
Visit Website + Add to Compare

What is Cyclonis Password Manager and how does it work?

Cyclonis Password Manager can be used to monitor, organise and control multiple passwords within a centralized location. Users can generate complex passwords as per their individual needs and enhance the security levels of their existing accounts. It uses the master password of its users to generate a 256-bit Encryption Key, the entire mechanism is a one way process and cannot be reversed. The particular encryption key is then used to secure all essential data. The software facilitates automated data sync across multiple connected devices. Users can add Cyclonis Password Manager’s browser extension within browsers like Firefox, Chrome, Microsoft Edge etc, and get the checkout pages and complicated online forms autofilled in a hassle-free manner. Besides this, a two-step optional verification system is embedded into the platform, enhancing the protection level. The software can also be utilised to safekeep essential data like personal information, bank details, credit card details, home Wi-Fi password, and more.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 86%
  • Reviews 60%
  • Momentum 60%
  • Popularity 61%

Cyclonis Password Manager Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

Products Similar to NetLib Security Encryptonizer Key Manager

Box KeySafe logo
Manage your own encryption keys 4.2 Based on 13 Ratings
Visit Website + Add to Compare

What is Box KeySafe and how does it work?

Box KeySafe, you have complete, independent control over your encryption keys with no impact to the user experience. All key usage is unchangeable and includes a detailed record of key usage, so you can track exactly why your organization’s keys are being accessed. And if you ever experience suspicious activity, your security team can cut off access to the content at any time.

Read more

Box KeySafe Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Azure Key Vault logo
Keep your cryptographic keys safe and secure 4.6 Based on 53 Ratings
Visit Website + Add to Compare

What is Azure Key Vault and how does it work?

Azure Key Vault is a security management software that can be and used to safeguard vital cryptographic keys, passwords and other secrets. Enhanced data protection and compliance technology offered by the software help users generate and import encrypted keys within minutes. The software is scalable in nature, users no longer need to deploy dedicated HSMs. They can achieve global redundancy with the particular and maintain a copy of their own HSMs for enhanced durability. Developers can further manage keys used for testing or development. They can maintain complete control of their keys and allow access permission to partners or applications whenever needed. Applications never possess direct access on keys. Moreover, the platform automates and simplifies various tasks related to TLS/SSL certificates. Users are also enabled to enroll and renew their certificates automatically from various supported public certificate authorities. Organizations can boost performance and reduce their cloud applications’ latency by storing their cryptographic keys in the cloud, instead of on-premises.

Read more
Visit Website
IBM Security Guardium Data Encryption logo
Keep your database and files protected from misuse 4.1 Based on 52 Ratings
Visit Website + Add to Compare

What is IBM Security Guardium Data Encryption and how does it work?

IBM Security Guardium Data Encryption is an advanced protection suite for important files and databases. The software comprises an integrated suite of products built on a shared infrastructure and achieves different capabilities such as data access, tokenization, audit logging, data masking, key management, and more. It also enables users to meet various rules and regulations, including CCPA, HIPPA, and GDPR. IBM Security Guardium Data Encryption further provides its users with centralized access controls and key management features for different encryption environments. It helps users to simplify the operations and reduce costs. The software enables data protection across hybrid multi-cloud environments, ensuring top level data security irrespective of their location. Business owners can use IBM Security Guardium Data Encryption for multiple purposes, like encrypting databases, containers, files, and applications. Businesses can encrypt key storage and manage different users’ access policies with the same. Moreover, the software also comes equipped with a cloud key orchestration facility.

Read more
Visit Website
Lockr logo
Secure Your Website And Applications 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Lockr and how does it work?

Lockr is a simple-to-use plugin for WordPress or Drupal to manage your site’s API and Encryption keys in a secure offsite hosted environment. Lockr removes the key from your site code and database and stores it in a secure and certified key manager. Then when your site needs the key to be used in a encryption/decryption or API request, Lockr will use secure certificate provided by the server to authenticate and release the key.

Read more

Lockr Pricing

  • Free Trial Available
  • Starts at $8.25.
Visit Website
SmartEncrypt logo
A simple File Encryption Solution Write a Review
Visit Website + Add to Compare

What is SmartEncrypt and how does it work?

SmartEncrypt is a product of DataConfidence solution is next-generation file encryption to secure files and folders. Generate data-specific encryption keys and assign access to individual users or groups. The software integrates with Dropbox, One Drive, and other popular cloud storage services.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 60%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

SmartEncrypt Pricing

  • Free Trial Not Available
  • Starts at $7.00. Offers Free-forever and Custom plan.
Visit Website
AWS Key Management Service logo
Create and control keys with AWS Key Management Service 4.5 Based on 35 Ratings
Visit Website + Add to Compare

What is AWS Key Management Service and how does it work?

To create and manage cryptographic keys AWS Key Management Service plays an important role. Featured by the top-most MNC, Amazon, this AWS Key Management Service is absolutely secure and resilient. It uses a plethora of hardware security modules that have been validated under FIPS 140-2, to protect essential keys. With AWS Key Management Service, users can enforce permissions and handle the durability/physical security of the keys. This service by Amazon also presents a single control point to manage keys as well as define policies consistently. Furthermore, by using the AWS Management Console or AWS SDK/CLI, users can easily create, import, rotate, delete and manage permissions on keys. Integrated with AWS Services, AWS KMS is used to simplify the keys and workloads alike. With this service, users can choose the level of access control that they need. AWS KMS also offers detailed logs of keys to AWS CloudTrail, providing an independent view of who accessed the encrypted data. Furthermore, with validation of FIPS 140-2, AWS KMS allows keys only inside the available devices. Other features of this service include compliance and in-built auditing.

Read more
Visit Website
Alibaba Key Management Service logo
Cryptographic Keys on the Cloud 4.7 Based on 3 Ratings
Visit Website + Add to Compare

What is Alibaba Key Management Service and how does it work?

Alibaba Cloud Key Management Service (KMS) provides secure, certified, available, reliable, and elastic key hosting and cryptography services to help you protect sensitive data assets.

Visit Website
Equinix SmartKey logo
Security control for all clouds 4 Based on 1 Ratings
Visit Website + Add to Compare

What is Equinix SmartKey and how does it work?

Equinix SmartKey, a global SaaS-based, secure key management and cryptography service, offered on cloud-neutral Platform Equinix, simplifies data protection across any cloud architecture. Equinix is the world’s digital infrastructure company. Digital leaders harness our trusted platform to bring together and interconnect the foundational infrastructure that powers their success. We enable our customers to access all the right places, partners and possibilities they need to accelerate advantage.

Read more

Equinix SmartKey Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website
Universal SSH Key Manager logo
Manage SSH Key Risks Effectively Write a Review
Visit Website + Add to Compare

What is Universal SSH Key Manager and how does it work?

UKM Zero Trust is a full lifecycle Enterprise SSH Key management solution reducing the management overhead of encryption keys with keyless access

Universal SSH Key Manager Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Doppler logo
Work smartly with Doppler 5 Based on 25 Ratings
Visit Website + Add to Compare

What is Doppler and how does it work?

Doppler is an Encryption Key Management Software that is dedicated to creating solutions that developers would appreciate. They understand that the appropriate product may help teams become more productive while simultaneously increasing security. Security technologies are frequently process-intensive and come with negative user experiences, resulting in poor adoption. The more you like Doppler, the more you'll want to use it. Doppler thrives in run-down, unsexy locations ready for upheaval. They're smack dab in the centre between infrastructure and code. Their clients entrust their secrets and uptime to them. You can work together. You can keep track of your secrets in different projects and locations. Slack, email, git, and zip files are no longer terrifying places to share secrets. Your team and their apps will have quick access to the secret after you've added it. In Doppler, you can automate everything and build references to commonly used secrets. You only have to update them once if they need to be changed. Furthermore, because Doppler works where you work, you may use your secrets in Docker, Serverless, or anywhere else.

Read more

Doppler Pricing

  • Free Trial Available
  • Starts at $7.00. Offers Free-forever and Custom plan.
Visit Website
Sepior logo
Key Management Solutions with MPC Write a Review
Visit Website + Add to Compare

What is Sepior and how does it work?

Sepior provides next generation key management technology that allows businesses to transact online with institutional-grade cryptocurrency wallets, private blockchains, and SaaS applications.

Sepior Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Akeyless Vault logo
An all in one secrets management platform 4.6 Based on 25 Ratings
Visit Website + Add to Compare

What is Akeyless Vault and how does it work?

Akeyless Vault is a unified vault management platform that can be used to secure DevOps credentials besides getting access to production resources over legacy and hybrid environments alike. Industry experts, partners and customers depend on the same to get their work streamlined on the go. Further, the software abides by an API-driven approach teamed with web-based dashboards to boost the overall efficiency levels. An intuitive secret management feature offered by Akeyless helps with real-time access to a safe vault for tokens, credentials, passwords and API keys alike. Users can also safeguard their infrastructure by enabling unified authentication and just in time ephemeral access permissions. Further, browser-based integrations, intuitive code manager, CI/CD access, identity providers, configuration managers, Kubernetes support, infra automation, real-time notifications and SDK support are of great help. The software also provides simplified authentication facilities with external Identity Providers like Azure AD, Okta, AWS IAM and more.

Read more

Akeyless Vault Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
Visit Website
Unbound CORE Key Management logo
Unified key management and security platform Write a Review
Visit Website + Add to Compare

What is Unbound CORE Key Management and how does it work?

CORE Key Management is a unified key management and protection platform which controls and manages all keys anywhere – on-premise, in the cloud, any cloud.

Visit Website
Privakey Cloud logo
Passwordless Authentication Software Write a Review
Visit Website + Add to Compare

What is Privakey Cloud and how does it work?

Privakey’s mission is to simplify how people confirm their identities, assert their intent and respond to any challenge. It improve the customer experience and security of digital interactions by eliminating the reliance on passwords, “security” questions and other forms of identity confirmation that introduce known security vulnerabilities and frustrate users.

Read more

Privakey Cloud Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed