Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (1)
Starting Price
  • (1)
  • (6)
Deployment
  • (3)
  • (1)
  • (31)
Customer Types
  • (3)
  • (2)
  • (29)
  • (31)
  • (30)
Pricing Model
  • (12)
  • (8)
  • (1)
  • (2)
  • (8)
  • (28)
Integrated With
  • (3)
  • (3)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 1 - 20 of 31 Products

Top 5 HashiCorp Vault Alternatives

Akeyless Vault logo
An all in one secrets management platform 4.6 Based on 25 Ratings
Visit Website + Add to Compare

What is Akeyless Vault and how does it work?

Akeyless Vault is a unified vault management platform that can be used to secure DevOps credentials besides getting access to production resources over legacy and hybrid environments alike. Industry experts, partners and customers depend on the same to get their work streamlined on the go. Further, the software abides by an API-driven approach teamed with web-based dashboards to boost the overall efficiency levels. An intuitive secret management feature offered by Akeyless helps with real-time access to a safe vault for tokens, credentials, passwords and API keys alike. Users can also safeguard their infrastructure by enabling unified authentication and just in time ephemeral access permissions. Further, browser-based integrations, intuitive code manager, CI/CD access, identity providers, configuration managers, Kubernetes support, infra automation, real-time notifications and SDK support are of great help. The software also provides simplified authentication facilities with external Identity Providers like Azure AD, Okta, AWS IAM and more.

Read More

Akeyless Vault Pricing

  • Free Trial Available
  • Starts at $2000.00. Offers Free-forever and Custom plan.
Azure Key Vault logo
Keep your cryptographic keys safe and secure 4.4 Based on 28 Ratings
Visit Website + Add to Compare

What is Azure Key Vault and how does it work?

Azure Key Vault is a security management software that can be and used to safeguard vital cryptographic keys, passwords and other secrets. Enhanced data protection and compliance technology offered by the software help users generate and import encrypted keys within minutes. The software is scalable in nature, users no longer need to deploy dedicated HSMs. They can achieve global redundancy with the particular and maintain a copy of their own HSMs for enhanced durability. Developers can further manage keys used for testing or development. They can maintain complete control of their keys and allow access permission to partners or applications whenever needed. Applications never possess direct access on keys. Moreover, the platform automates and simplifies various tasks related to TLS/SSL certificates. Users are also enabled to enroll and renew their certificates automatically from various supported public certificate authorities. Organizations can boost performance and reduce their cloud applications’ latency by storing their cryptographic keys in the cloud, instead of on-premises.

Read More
AWS Secrets Manager logo
Protect your company’s secrets with AWS Secrets Manager 4.6 Based on 36 Ratings
Visit Website + Add to Compare

What is AWS Secrets Manager and how does it work?

AWS Secrets Manager is a comprehensive data protection solution that helps companies to safeguard the data required to get access to their applications, IT resources and other essential metrics. The service enables users to rotate, manage and retrieve their database credentials, API keys and other sensitive information in an efficient manner. Also, it uses encryption keys to encrypt data and store them in AWS Key Management Service (KMS). With AWS Secrets Manager, companies can rotate secrets on-demand or as per schedule by using an inbuilt Secrets Manager console, AWS CLI or AWS SDK. In addition, brands can even replicate essential information and store them in multiple regions in an automated way. Thus getting access to easy recovery after data loss. The solution also helps users with the monitoring and audit of their protected data through a variety of useful integrations made available to them. AWS Secrets Manager can also be used to manage information for workloads related to the Department of Defense.

Read More

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Hypervault logo
One place to store sensitive data Write a Review
Visit Website + Add to Compare

What is Hypervault and how does it work?

Hypervault provides templates for many different types of sensitive data allowing you to safely store, manage and share your company's credentials, keys, settings, licences and device information. Own and control your company's sensitive data and your customers privacy. Without compromising security. Our servers are located in Europe, guaranteeing European businesses stay GDPR compliant.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 90%
  • Reviews 60%
  • Momentum 60%
  • Popularity 71%

Hypervault Pricing

  • Free Trial Available
  • Hypervault Offers Free-forever plan.
Seekrit logo
Managing Secrets Made Simple Write a Review
Visit Website + Add to Compare

What is Seekrit and how does it work?

Seekrit software is a platform used to maintain independence and team scalability meet within a secure workspace. The software offers variables into any project, whether it's NodeJS, Django, Terraform. Manage access control for your developers to join your project(s) and variables. It is a secure platform with database encryption at rest.

Read More

Seekrit Pricing

  • Free Trial Not Available
  • Seekrit Offers Free-forever plan.

Products Similar to HashiCorp Vault

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Keycloak logo
An Open-source Identity And Access Management Tool For Modern Applications 4.4 Based on 40 Ratings
Visit Website + Add to Compare

What is Keycloak and how does it work?

Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 93%
  • Reviews 70%
  • Momentum 63%
  • Popularity 73%

Keycloak Pricing

  • Free Trial Not Available
  • Keycloak Offers Custom plan.

79% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Securden Password Vault logo
Launch One-Click Remote Connections Write a Review
Visit Website + Add to Compare

What is Securden Password Vault and how does it work?

Securden Password Vault provides IT teams with a powerful, centralized solution for managing and controlling their passwords. With the cutting-edge password manager, you can store, organize, share, and track your passwords in an easy and secure manner. We offer both on-prem solutions to self-host and fully cloud-based solutions to ensure that you have rock-solid security while still being able to access your passwords anytime, anywhere. The Securden Password Vault allows you to take responsibility for who is able to access which passwords. Through easily managed profiles that control user access rights at all times, you can quickly check user activity logs and monitor or even restrict access as needed. Automating security best practices helps ensure that you always comply with standards while reducing security risks across the board. Experience the high level of security provided by Securden while taking advantage of the convenience of having complete control over all of your passwords in one convenient location – no matter where you are.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 94%
  • Reviews 60%
  • Momentum 62%
  • Popularity 64%

Securden Password Vault Pricing

  • Free Trial Available
  • Securden Password Vault Offers Custom plan.
Equinix SmartKey logo
Security control for all clouds 4 Based on 1 Ratings
Visit Website + Add to Compare

What is Equinix SmartKey and how does it work?

Equinix SmartKey, a global SaaS-based, secure key management and cryptography service, offered on cloud-neutral Platform Equinix, simplifies data protection across any cloud architecture. Equinix is the world’s digital infrastructure company. Digital leaders harness our trusted platform to bring together and interconnect the foundational infrastructure that powers their success. We enable our customers to access all the right places, partners and possibilities they need to accelerate advantage.

Read More

Equinix SmartKey Pricing

  • Free Trial Available
  • Equinix SmartKey Offers Custom plan.
VoltShare logo
Secure Data Sharing Write a Review
Visit Website + Add to Compare

What is VoltShare and how does it work?

VoltShare helps you securely share your critical data while ensuring compliance. Send and store confidential information with end-to-end encryption that eliminates the age-old problem of shared secrets and public-key mgmt. Maximize the privacy of your information. Then confidently share information with an individual or group of people. Share your confidential information like you do today Slack, email, Dropbox, SharePoint, etc. Simplify compliance through automated logs and auditability for all shared data including successful and failed decryption attempts.

Read More

VoltShare Pricing

  • Free Trial Not Available
  • VoltShare Offers Free-forever and Custom plan.

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Evervault logo
Customer data that’s always secure and compliant Write a Review
Start Free Trial Get Buyer Checklist + Add to Compare

What is Evervault and how does it work?

Introducing Evervault, the cutting-edge platform for securing any and all data transferred online. With best-in-class encryption and serverless functions, Evervault guards the information with the utmost professionalism and peace of mind. Vulnerable financial information is particularly at risk online these days, but now they don't need to worry about protecting the customers' credit cards and Personal Identifiable Information. Rely on Evervault's secure encryption algorithms to eliminate potential hacking threats - ensuring smooth, safe interactions every time. Data sharing between trusted parties or third party APIs is secure too with Evervault. Automatically encrypt sensitive material while it's in transit so they can guarantee security at every point in a transaction. Plus, with powerful serverless function, businesses can run complex operations without exposing them to potentially risky situations. Invest in the future of digital security: choose Evervault!

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 77%
  • Reviews 60%
  • Momentum 60%
  • Popularity 75%

Evervault Pricing

  • Free Trial Not Available
  • Starts at $395.00. Offers Free-forever and Custom plan.
VMware AppDefense logo
Workload Protection Software 4.5 Based on 2 Ratings
Visit Website + Add to Compare

What is VMware AppDefense and how does it work?

VMware AppDefense is a new approach to workload protection that models intended application behavior and identifies anomalous activity. Enable application control and allow listing and patch risky software sooner by continuously scanning workloads to highlight vulnerabilities in the OS, hypervisor, or application software. Ensure OS integrity, and provide reputation scores for every process. Provide additional workload context to NSX to assist in the definition of micro-segments, and enable faster and more granular responses to risky workload behavior, by pushing into NSX policies for actions such as quarantining, activity logging, etc.

Read More

VMware AppDefense Pricing

  • Free Trial Not Available
  • VMware AppDefense Offers Custom plan.
Cisco ACI logo
Facilitates application agility and data center automation 4.5 Based on 20 Ratings
Visit Website + Add to Compare

What is Cisco ACI and how does it work?

Cisco ACI is an online-based Data Center Security Software. The Cisco ACI application-driven policy framework automates provisioning and managing of resources, thereby delivering a network that is deployed, monitored, and managed in a fashion that supports DevOps and rapid application change. Take a holistic, systems-based approach to data center security with Cisco Application Centric Infrastructure Security Solutions. These solutions provide a common policy-based operational model across ACI-ready networks. As a result, you can reduce cost and complexity without compromising data center functionality.

Read More

Cisco ACI Pricing

  • Free Trial Available
  • Cisco ACI Offers Custom plan.
Symantec Data Center Security logo
Complete server protection, monitoring, and workload micro-segmentation 4.5 Based on 12 Ratings
Visit Website + Add to Compare

What is Symantec Data Center Security and how does it work?

Symantec Data Center Security is an online-based Data Center Security Software. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services. ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry’s largest partner ecosystem. Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alert speed responses to critical incidents with orchestrated actions targeting multiple Symantec products.

Read More

Symantec Data Center Security Pricing

  • Free Trial Not Available
  • Symantec Data Center Security Offers Custom plan.
ServerProtect for Linux logo
Stops malware from spreading through Linux Servers 3 Based on 1 Ratings
Visit Website + Add to Compare

What is ServerProtect for Linux and how does it work?

Trend Micro ServerProtect™ for Linux 3.0 offers comprehensive real-time protection for enterprise web servers and file servers, preventing them from spreading viruses, spyware, and other Web threats to internal or external endpoints. Real-time, on-demand and scheduled scanning use the latest multi-threaded scanning engine for the highest performance while kernel-level scanning minimizes performance degradation. Enables central management of attack information, policy deployment, pattern file and scan engine deployment, and reports on policy implementation.

Read More

ServerProtect for Linux Pricing

  • Free Trial Available
  • ServerProtect for Linux Offers Custom plan.
FireEye Data Center Security logo
Protecting the data center from cyber attacks Write a Review
Visit Website + Add to Compare

What is FireEye Data Center Security and how does it work?

FireEye cybersecurity products and solutions enable organizations to prevent, detect and respond to advanced malware and other cyber attacks targeting the data center that routinely bypass conventional signature-reliant defenses. Shield data centers from advanced persistent threats (APTs) and sophisticated malware found in content stores, web and application servers, and common file shares. Protect your key assets and prevent attacks with products and services that work together and share threat intelligence.

Read More

FireEye Data Center Security Pricing

  • Free Trial Not Available
  • FireEye Data Center Security Offers Custom plan.
Aaronis Cyberprotect Cloud logo
Prevent client downtime and data loss Write a Review
Visit Website + Add to Compare

What is Aaronis Cyberprotect Cloud and how does it work?

Acronis Cyber Protect Cloud is the ultimate solution for service providers, offering unified backup and next-generation AI-based anti-malware and antivirus protection management. By integrating and automating these processes, service providers can significantly reduce complexity and increase productivity while also cutting operating costs. The advanced AI-based behavioral detection engine provides the best protection against malware, ransomware, and zero-day attacks on client workloads. Additionally, full-image and file-level backup and recovery capabilities ensure that workloads on more than 20 platforms are safeguarded with near-zero Recovery Point Objectives and Recovery Time Objectives.

Read More

Aaronis Cyberprotect Cloud Pricing

  • Free Trial Not Available
  • Aaronis Cyberprotect Cloud Offers Custom plan.
ManageEngine OpManager Plus logo
IT Operations Management Write a Review
Visit Website + Add to Compare

What is ManageEngine OpManager Plus and how does it work?

OpManager Plus is a powerful, integrated solution that streamlines the process of IT operations management, eliminating the need for multiple monitoring tools. This holistic tool provides greater visibility across your IT infrastructure, helping you to remove operational bottlenecks, optimize performance and gain the maximum output from your IT infrastructure. With advanced IT operations monitoring and management capabilities, OpManager Plus offers four layers of visibility into an organization's IT operations - IT infrastructure security, IT infrastructure application performance, server and storage IT operations, and network performance. This multi-level visibility into IT operations helps IT admins identify and troubleshoot faults at various levels easily, thereby ensuring greater SLA compliance, proactive IT fault management, greater customer service and consistent IT infrastructure performance.

Read More
Datto SaaS Defense logo
Advanced Threat Protection for Microsoft 365 Write a Review
Visit Website + Add to Compare

What is Datto SaaS Defense and how does it work?

Datto SaaS Defense is the perfect solution for MSPs to protect their clients from the latest malware, business email compromise (BEC), and phishing attacks targeting Microsoft Exchange, OneDrive, SharePoint, and Teams. Armed with the latest AI-driven threat detection capabilities, Datto SaaS Defense can detect zero-day threats as soon as they appear, so clients don’t have to suffer the consequences of waiting days or even weeks to discover an attack. The security solution is designed to be data-independent, so it can easily be integrated into existing Microsoft 365 environments and keep data safe without disrupting the user experience. Its advanced proactive protection capabilities are tailored to detect and prevent ransomware, malware, phishing attempts and BEC attacks, while also providing reliable security for OneDrive, SharePoint, and Teams data.

Read More

Datto SaaS Defense Pricing

  • Free Trial Not Available
  • Datto SaaS Defense Offers Custom plan.
Hitachi Content Intelligence logo
Intelligent data discovery and transformation Write a Review
Visit Website + Add to Compare

What is Hitachi Content Intelligence and how does it work?

Hitachi Content Intelligence maximizes data value to deliver the information you need to make the smartest business decisions. Mitigate your industry’s data growth and sprawl and easily find the data you need. Enrich your data to deliver the most relevant information that your business needs to stay informed. Aggregate data from any sources, surface new insights and boost productivity with robust searches.

Read More

Hitachi Content Intelligence Pricing

  • Free Trial Not Available
  • Hitachi Content Intelligence Offers Custom plan.
GitGuardian logo
A Monitoring Platform Built To Uncover Sensitive Company Information And Address Data Leak Issues Write a Review
Visit Website + Add to Compare

What is GitGuardian and how does it work?

GitGuardian is a private solution built to monitor and detect credential data leaks. It monitors official repositories listed under the GitHub organization and also the developer’s personal or public repositories. The platform covers 200+ API providers, private keys, database connection strings, certificates, usernames, and passwords. It comes with sophisticated pattern matching techniques that help to detect credentials that cannot be strictly defined with distinctive patterns. Developers are alerted alongside security teams and the meantime to detect is just a few seconds. It’s integrated with SIEM, ticketing systems, chats, and ITSM. It collaborates with developers and collects developer feedback directly in the dashboard to better investigate and prioritize issues. Users can monitor their internal repositories either public or private. The internal repositories monitoring feature includes integrations with GitHub and GitLab natively. Users can use the platform’s API to integrate into git hooks or in the CI as well. It comes with the ability to define custom detectors to identify specific internal tokens or hostnames.

Read More

GitGuardian Pricing

  • Free Trial Available
  • GitGuardian Offers Custom plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed