Introducing
The Slant team built an AI & it’s awesome
Find the best product instantly
Add to Chrome
Add to Edge
Add to Firefox
Add to Opera
Add to Brave
Add to Safari
Try it now
4.7 star rating
0
What is the best alternative to Thycotic Secret Server?
Ad
Ad
SecretHub
All
4
Experiences
Pros
4
Top
Pro
Client-side encryption
Everything is encrypted client-side. Only the people or machines you share a secret with, can decrypt it.
See More
Top
Pro
Audit logging
Every action you or your team members perform is logged. The audit logs give you full insight into who did what, when.
See More
Top
Pro
Open Source
All client-side code is available on GitHub.
See More
Top
Pro
As a Service
Do not worry about hosting your secret management solution, it is provided As as Service.
See More
Hide
Get it
here
3
0
StackExchange Blackbox
All
3
Experiences
Pros
3
Top
Pro
Easily share secrets with other team members
Since the secrets file is stored in the remote VCS server, anyone that has access to it (team members) also have access to the secrets file.
See More
Top
Pro
Free and open source
StackExchange Blackbox is free and open source. It's released under the MIT license and its source code is freely available on GitHub.
See More
Top
Pro
Uses a VCS repo to store the secrets
SE Blackbox works with Git, Mercurial, Subversion and Perforce to store encrypted secrets file in a repository. Files are automatically encrypted and decrypted using GNU Privacy Guard.
See More
Hide
Get it
here
3
0
CloudFlare Red October
All
3
Experiences
Pros
2
Cons
1
Top
Pro
Fully open source
Red October is fully open source, from the encryption library to the UI modules. Everyone can inspect the code hosted on GitHub or fork it and implement it to suit their needs if they have to.
See More
Top
Con
Uses its own crypto library
Red October uses its own crypto implementation in to encrypt secrets. While it's not necessarily a security risk, it would be safer to use a crypto library that has proven it's worth and that has been used for a long time in a lot of projects.
See More
Top
Pro
Uses the "two-man rule" for extra security
Red October was built to add an extra layer of security inside organizations. The "two-man rule" that Red October employs means that data can only be decrypted if two or more users provide the necessary keys.
See More
Hide
Get it
here
3
0
Ansible Vault
All
3
Experiences
Pros
2
Cons
1
Top
Pro
The documentation does a good job on explaining how to use it
The official documentation of Ansible vault does a great job at explaining how Ansible Vault works and how to use the easy UI for encrypting, decrypting, and re-keying your secrets for storing in source control.
See More
Top
Con
No way of exposing just the key in the key-value pair
Ansible vault files are encrypted YAML key-value stores. The entire file is encrypted, and so it's impossible to indicate which keys are defined within the vault without also viewing values.
See More
Top
Pro
Allows keeping encrypted data in ansible playbooks easily
Ansible uses configuration files called playbooks which are used to describe a policy that the remote system needs to follow. Though there is often a need to keep data from these configurations files encrypted when using source control. Doing this in Ansible's Vault is pretty easy, simply running: ansible-playbook site.yml --ask-vault-pass will run a playbook which uses encrypted data.
See More
Hide
Get it
here
3
0
Conjur
All
3
Experiences
Pros
3
Top
Pro
Can bundle different cloud services into a single interface
If a company uses more than a cloud service on which they run their platform, you don't need to use a different service to manage secrets for each of them, instead Conjur bundles all of them in a simple to use user interface.
See More
Top
Pro
Easy setup
Setting up Conjur is pretty easy. All a user has to do is install the client, set up an account and through the guidance of the user interface, choose the operations with which the developers will use to control their data and servers.
See More
Top
Pro
Provides tools for monitoring activity
Conjur provides detailed information on activity of all users and changes within the secret storage. It also provides graphs and comes with a warning system to make monitoring easier.
See More
Hide
Get it
here
2
0
Amazon Key Management Service
All
3
Experiences
Pros
2
Cons
1
Top
Pro
Extremely secure
Amazon has used a lot of techniques to harden the process of storing and securing keys in its service. For example, keys are not stored on disk, nor are they allowed to persist in memory. Amazon employees can not access a user's secret keys physically and the keys themselves are stored in the same geographical region as the application they belong to.
See More
Top
Con
Does not generate certificates
KMS does not generate certificates, in order to generate them you have to roll out your own solution.
See More
Top
Pro
Easy to use from a single dashboard
AWS Key Management Service offers a single unified dashboard that teams can use to manage and store their secrets used in applications hosted on AWS services. In the dashboard users can create keys, retrieve them and audit key usage through detailed information offered to them
See More
Hide
Get it
here
1
0
Built By the Slant team
Find the best product instantly.
4.7 star rating
Add to Chrome
Add to Edge
Add to Firefox
Add to Opera
Add to Brave
Add to Safari
Try it now - it's free
{}
undefined
url next
price drop