Entro

Entro

Entro Security
+
+

Related Products

  • Auth0
    1,008 Ratings
    Visit Website
  • Keeper Security
    1,752 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • 1Password
    16,550 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website

About

A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.

About

Non-Human Identity & Secrets Security Platform. A pioneer in non-human identity management, Entro enables organizations to securely utilize non-human identities and secrets, overseeing their usage and automating their lifecycle from inception to rotation. Secrets-based cyber attacks are devastating and growing as more and more secrets are created by R&D teams and spread across various vaults and repositories with no real secret management, monitoring, or security oversight. Streamline and secure your non-human identity lifecycle management. With Entro, security teams can now oversee and protect Non-human identities with automated lifecycle management and seamless integration, ensuring comprehensive security & compliance through a unified interface.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations searching for an automated directory and authorization platform

Audience

Companies that need a powerful non-human identity management and secrets management platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberArk
Founded: 2013
United States
conjur.org

Company Information

Entro Security
Founded: 2022
United States
entro.security/

Alternatives

HashiCorp Vault

HashiCorp Vault

HashiCorp

Alternatives

RadiantOne

RadiantOne

Radiant Logic
Astrix

Astrix

Astrix Security

Categories

Categories

Integrations

Amazon Web Services (AWS)
Brainwave GRC
Cyberwatch
DatAnswers
Docker
Entrust Certificate Hub
Entrust Identity Enterprise
Google Cloud Platform
Jenkins
Kubernetes
Red Hat OpenShift
SCADAfence
SQLXPress
Securonix Unified Defense SIEM
Sendmail
Terraform
ThreatSync
Trustwave DbProtect

Integrations

Amazon Web Services (AWS)
Brainwave GRC
Cyberwatch
DatAnswers
Docker
Entrust Certificate Hub
Entrust Identity Enterprise
Google Cloud Platform
Jenkins
Kubernetes
Red Hat OpenShift
SCADAfence
SQLXPress
Securonix Unified Defense SIEM
Sendmail
Terraform
ThreatSync
Trustwave DbProtect
Claim CyberArk Conjur and update features and information
Claim CyberArk Conjur and update features and information
Claim Entro and update features and information
Claim Entro and update features and information