Microsoft Azure Key Vault is a cloud-based data security and storage service that allows users to keep their secrets safe from bad actors.
The cost of the Azure Key Vault is very high and the pricing model is based on the number of keys that you store and retrieve.
Pricing is quite reasonable and support is included, although premium support is available for an additional fee.
The cost of the Azure Key Vault is very high and the pricing model is based on the number of keys that you store and retrieve.
Pricing is quite reasonable and support is included, although premium support is available for an additional fee.
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
I don't believe there is a license cost for the solution.
The solution is expensive.
I don't believe there is a license cost for the solution.
The solution is expensive.
HashiCorp Vault is a cloud-agnostic solution used for security and secret management. Its valuable features include integration with other HashiCorp tools, token sharing, open source nature, cloud agnosticism, and on-the-fly encryption management.
I am using the open-source version of Vault and I would have to buy a license if I want to get support.
It's free, it's open-sourced.
I am using the open-source version of Vault and I would have to buy a license if I want to get support.
It's free, it's open-sourced.
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
It isn't terribly expensive.
The price of this solution is good.
It isn't terribly expensive.
The price of this solution is good.
CyberArk Enterprise Password Vault, a vital component of the CyberArk Privileged Access Manager Solution (PAM), is designed to create, secure, rotate, and control access to privileged accounts and credentials used to access systems throughout an enterprise IT ecosystem. CyberArk Enterprise Password Vault enables enterprise organizations to better understand the scope of their privileged account risks and put controls in place to prevent malicious or inappropriate account or credential access.
This solution is expensive.
The price of this solution is expensive.
This solution is expensive.
The price of this solution is expensive.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions.
PowerBroker for a Mac client is three times the price of the Windows version.
I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions.
PowerBroker for a Mac client is three times the price of the Windows version.
Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to significantly reduce cyber theft. As the leading password manager and digital vault, Keeper helps millions of people and thousands of businesses substantially mitigate the risk of a data breach. Keeper is SOC 2 Certified and utilizes best-in-class encryption to safeguard its customers. Keeper protects industry-leading companies including Sony, Chipotle, and The University of Alabama at Birmingham. Keeper partners with global OEMs and mobile operators to preload Keeper on smartphones and tablets. Learn more at https://keepersecurity.com.
Free works unless the paid is absolutely necessary.
The more users, the better the price. Always opt for the live support.
Free works unless the paid is absolutely necessary.
The more users, the better the price. Always opt for the live support.
WALLIX offers cybersecurity and privileged access management solutions that secure and protect your most critical IT assets.
Pricing of this solution is good for the local market and is more affordable than CyberArk, BeyondTrust and One Identity.
The solution's price is mid-ranged.
Pricing of this solution is good for the local market and is more affordable than CyberArk, BeyondTrust and One Identity.
The solution's price is mid-ranged.
Auto-pilot for all your passwords
If you import from sources like XML, keepass, CSV files be sure to clean the import files, this reduces the adjustments in the slow tool itself.
You do not have to purchase licenses for your entire organization. You can scale as adoption grows.
If you import from sources like XML, keepass, CSV files be sure to clean the import files, this reduces the adjustments in the slow tool itself.
You do not have to purchase licenses for your entire organization. You can scale as adoption grows.
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
The licensing cost for this solution is based on the number of endpoints.
The price is pretty expensive, but you get what you pay for and this is a great product.
The licensing cost for this solution is based on the number of endpoints.
The price is pretty expensive, but you get what you pay for and this is a great product.
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.
On a scale of one to five, with one being expensive and five being competitive, I would rate the pricing of this solution as a five.
On a scale of one to five, with one being expensive and five being competitive, I would rate the pricing of this solution as a five.
Delinea Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.
It is sad that people with a limited budget won't be able to afford it.
The price model is based on the number of devices and opposed to the number of users, and it is not very flexible.
It is sad that people with a limited budget won't be able to afford it.
The price model is based on the number of devices and opposed to the number of users, and it is not very flexible.
We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.
The pricing is great. We've been given discounts that make it cheaper than using any other solution.
The pricing is great. We've been given discounts that make it cheaper than using any other solution.
Privileged access management allows granular access control over privileged admin tasks in Office 365. It can help protect your organization from breaches that use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bounded approval workflow. This configuration gives users just-enough-access to perform the task at hand, without risking exposure of sensitive data or critical configuration settings. Enabling privileged access management in Microsoft 365 allows your organization to operate with zero standing privileges and provide a layer of defense against standing administrative access vulnerabilities.
Akeyless Vault is an end-to-end unified platform to manage and protect all types of Secrets while fully securing Access. It provides coverage for all use cases, across hybrid, multi-cloud and legacy environments. Akeyless Vault enables full visibility into Secrets usage and detailed analytics, which are crucial for compliance with various security regulations and maintaining security controls. • Secrets Management - automate secrets across your DevOps tools and cloud platforms using a secured vault for credentials, tokens, API-Keys and passwords • Zero Trust Access - secure your infrastructure and applications by enabling a unified authentication and ephemeral just-in-time acAkeyless Vault is an end-to-end unified platform to manage and protect all types of Secrets while fully securing Access. Akeyless Vault provides secrets management and zero-trust access in a SaaS context for all use cases, across hybrid cloud, multi-cloud and legacy environments. It also enables full visibility into Secrets usage and detailed analytics, which are crucial for compliance with various security regulations and maintaining security controls.pp-level encryption and tokenization services.
Zoho Vault Securely store, share, and manage your passwords from anywhere, securely store all passwords and organize them for easy access and management. Passwords are encrypted with the strongest encryption standard (AES-256). Safely, it shares common passwords among members of your work group by granting different access privileges. Zoho Vault directly connect to websites and applications without having to manually enter login credentials. It can easily provide passwords to users and groups in bulk and can instantly deny access when a user is removed. It tracks user actions and maintains complete records of team members' password activity with timestamps. With in-depth reports, it keeps track of which users have access to various passwords.
Zoho Vault is cheap.
Zoho Vault is cheap.
DevOps Secrets Safe is a highly scalable solution that adapts to the speed and agility required in dynamic DevOps workflows. It will help organizations limit the risk associated with substantial unmanaged privileged credentials and secrets without causing friction in highly dynamic environments such as DevOps.
There is an annual license required to use BeyondTrust DevOps Secrets Safe.
There is an annual license required to use BeyondTrust DevOps Secrets Safe.
We offer credential injection, reporting, auditing, password change automation, and privileged client documentation capabilities—designed to streamline the technicians' day by placing essential documentation at their fingertips to standardize service delivery.
We pay the license fee monthly and the price is reasonable.
We pay the license fee monthly and the price is reasonable.