Alternatives to CryptAway

Compare CryptAway alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CryptAway in 2026. Compare features, ratings, user reviews, pricing, and more from CryptAway competitors and alternatives in order to make an informed decision for your business.

  • 1
    Securden Password Vault for Enterprises
    Securden Password Vault for Enterprises is a scalable, enterprise-grade credential management solution available in both cloud (SaaS) and on-premise deployments. It centralizes the storage of passwords, SSH keys, DevOps secrets, files, and other sensitive data in an AES-256 encrypted vault, helping organizations enforce strong security controls and defend against insider and external threats. The solution enables secure credential storage, granular access controls, automated password rotation, and just-in-time access while providing full visibility through audit logs, session recordings, and real-time alerts. IT teams can launch secure remote connections such as RDP, SSH, and SQL directly from the vault without exposing credentials. Trusted by enterprises worldwide, Securden helps organizations strengthen security posture, streamline credential governance, improve operational efficiency, and meet compliance requirements across industries.
    Compare vs. CryptAway View Software
    Visit Website
  • 2
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!
    Starting Price: $6 per seat per month
  • 3
    AxCrypt

    AxCrypt

    AxCrypt

    AxCrypt is an award-winning and easy to use, file and password encryption software, available on Windows, Mac, iOS and Android. Use AxCrypt to encrypt and protect your sensitive files, passwords and business data. AxCrypt comes with several unique features, including: ✅ Mobile Encryption ✅ Automatic Cloud Encryption ✅ Password Manager ✅ Automatic Encryption ✅ Encrypted File Sharing ✅ Master Key AxCrypt has been consistently awarded as the ‘Best Encryption Software’ by PC Mag for 7 years in a row, starting in 2016. AxCrypt is available on Windows, Mac, iOS and Android, and integrates with popular cloud storage providers such as Google Drive, OneDrive, and Dropbox. "Advanced encryption in a superbly simple setting" - PCMag Editor's choice 2023 With AxCrypt you easily and securely protect all your important files, in an interface that is clean and simple to use. AxCrypt implements strong AES-256 encryption.
    Starting Price: $3.63 per month
  • 4
    EndCrypt

    EndCrypt

    Procenne

    EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt provides a broad range of patented security capabilities to protect applications by preventing reverse engineering techniques via code obfuscation and anti-repackaging technology. It actively detects malicious key logging, screen readers, repackaged applications, debuggers and emulators, and jailbroken or rooted devices. It blocks foreign code from executing or shuts down the application to protect sensitive data from cybercriminals.
  • 5
    CryptPad

    CryptPad

    CryptPad

    CryptPad is built to enable collaboration. It synchronizes changes to documents in real time. Because all data is encrypted, the service and its administrators have no way of seeing the content being edited and stored. Store and manage documents with CryptDrive. Create folders, shared folders, and tags to organize documents. Upload and share files (PDFs, photos, video, audio, etc.). Team drives are shared between users and allow for collaborative organization and fine-grained access controls. CryptPad does not profit from user data. This is part of a vision for online services that respect privacy. Unlike the big platforms that pretend to be "free" while making profits from personal information, CryptPad aims to build a sustainable model funded willingly by users. We offer CryptPad's functionality for free because we believe everyone deserves personal privacy, not just people with disposable income.
    Starting Price: €5 per month
  • 6
    JM-Crypt

    JM-Crypt

    JM-Crypt

    Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 7
    VideoCrypt

    VideoCrypt

    AppSquadz Software Pvt. Ltd.

    VideoCrypt by AppSquadz is a secure, scalable video streaming and encryption platform designed to safeguard digital content from piracy and unauthorized access. With multi-DRM protection, dynamic forensic watermarking, anti-screen recording, and AWS-powered global delivery, it ensures safe end-to-end streaming across all devices. Ideal for OTT platforms, e-learning businesses, media companies, and enterprises, VideoCrypt offers white-label apps, fast adaptive playback, robust analytics, and seamless VOD/live streaming for professional content distribution. The platform also supports offline access with secure DRM downloads, device-level restrictions, concurrency control, and real-time threat detection to ensure complete content security. With easy integration, customizable UI, and flexible monetization models, VideoCrypt empowers businesses to deliver high-quality video experiences while maintaining full control over their content and revenue.
    Starting Price: $59 for 50 Hrs T&C
  • 8
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 9
    Cisdem AppCrypt
    Cisdem AppCrypt is an app lock and website blocker rolled into one. You can use it to protect privacy by locking certain apps with a password. You can also use it to improve focus and productivity by blocking distracting sites. With it, parents can protect their children from inappropriate sites. Protect apps - Lock individual apps, such as Photos and WhatsApp - Allow access to your chosen apps only (on Mac only) Block websites - Block specific sites, such as facebook.com - Filter URLs including the keywords you specify - Restrict certain categories of sites, such as social media - Allow access to approved sites only Set schedules - Schedule app locking and website blocking to be active at all times or during specific times - Provide a General Schedule feature - Provide a Custom Schedule feature (on Mac and Windows only) Offer password protection - Require a password unlock apps, unblock sites, or change schedules - Require a password to quit Cisdem AppCrypt
    Starting Price: $19.99 per year
  • 10
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 11
    Propine

    Propine

    Propine

    Propine has a suite of institutional grade, blockchain-agnostic solutions that caters to all digital assets including digital securities, cryptocurrencies, stable coins, NFTs and fiat. At the core of the Propine’s solution is Pro-Tect, an integrated digital asset custody platform that provides the highest levels of certified security and compliant solution for safeguarding multiple asset classes. Our state-of-the-art solutions includes Digital Securities: DASH and PropSS and Crypto Management: CryptClear and DeFi-nity. Through our KYC and AML service, we ensure that you can manage and mitigate regulatory and compliance risks while allowing customers to be onboarded safely and efficiently, each time. We are ISO 270001 certified and have a predictive cybersecurity posture with SOC monitoring, HIPS, UEBA, Insider threat systems. In addition, we are equipped with a mature risk management framework and hardened, modular governance with tamper proof, programmable, policy engines.
  • 12
    Rationalk

    Rationalk

    Rationalk

    A taylor-made agile software to plan, execute and control your projects. We listen carefully to your needs and challenges (from your business side as well as IT side). We look for rational solutions : simple and efficient (even if this implies to use something else than Rationalk). We attach great importance to IT security of our software and to confidentiality of your data. We do our best to limit our impact on the planet (work from home, video meetings, local suppliers, environmental-friendly suppliers). You tell us what is your main obstacle in the field of project management. We evaluate immediatly if Rationalk can solve it. Data exchange is crypted (TLS/SSL) and based on the HTTPS protocol. Informations between your browser and your server cannot be intercepted. Password hacking attemps are automatically identified and user accounts are instantaneously protected.
    Starting Price: $2000.00/year
  • 13
    HomeBank

    HomeBank

    HomeBank

    Designed to be easy to use and to be able to analyse your personal finance and budget in detail using powerful filtering tools and beautiful charts. If you feel that your personal finance require additional level of security, there is plenty of solutions to encrypt data on a computer (TrueCrypt, PGP, native windows bitlocker) for that purpose. A financial application should manage finance data, and a security program should deal with security. Any software must have some scope limits. I think it is better to use external proven and reliable solutions than implement a smokescreen, as the file format used for HomeBank to store data is a simple xml file (so text file), you can review with a txt editor. Adding to this, I do think it make sense and it is more convenient to protect data globally on a computer, instead of being annoyed to fill in a password every time you open a file with an application, your session password and a truly global protection system on your computer.
  • 14
    CryptAPI

    CryptAPI

    CryptAPI

    Your easy to use, secure and privacy oriented payment gateway. Accept cryptocurrency on your website and get paid instantly, just with your crypto address. Forget all about lengthy sign-ups, applying for merchant accounts and being restricted to one cryptocurrency. With CryptAPI you can give more choices to your customers, by accepting payments in multiple cryptocurrencies, including Bitcoin, Bitcoin Cash, Litecoin, Ethereum, Monero, USDT and IOTA (more coming soon), hassle-free. Receive your payments directly to offline / cold wallets. Accept payments in multiple currencies without extra integrations. No hidden costs or hard-to-understand fees, our fee formula for each coin is shown here. You don't need to poll our service to check if the user paid, our service will notify you! We have a dedicated and vertically integrated infrastructure, to make sure your payments are never lost and we can help you with any issues that may arise.
  • 15
    ZevaCrypt

    ZevaCrypt

    ZevaCrypt

    Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.
    Starting Price: $9.90 per month
  • 16
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. Accelerated password recovery with multiple computers, NVIDIA and AMD GPUs, and Rainbow Tables. In addition to all the key features of a Windows version, Passware Kit Forensic for Mac provides access to APFS disks from Mac computers with Apple T2 chip.
    Starting Price: $1,195 one-time payment
  • 17
    Kaspersky Anti-Ransomware Tool
    Kaspersky Anti-Ransomware Tool protects from ransomware at any stage of the attack from delivery to execution using technologies in the multi-layered protection stack. Ransomware attacks someone every 5 seconds. Our free tool provides proven, powerful protection from ransomware like Maze, Conti, REvil, Netwalker, DoppelPaymer, WannaCry, Petya, Bad Rabbit, Locky, TeslaCrypt, Rakhni, Rannoh and many others. It's completely compatible with your current security solutions and will successfully complement them. This lightweight ransomware protection tool uses all the features of cutting-edge Kaspersky endpoint protection technologies, such as cloud-assisted behavior detection to block ransomware and crypto-malware immediately. It also includes a ransomware scanner and acts as a complete solution for ransomware prevention. Kaspersky Anti-Ransomware Tool is capable of blocking both local and remote attempts to encrypt user data.
    Starting Price: $24.37 per year
  • 18
    IBM Cloudant
    IBM Cloudant® is a distributed database that is optimized for handling heavy workloads that are typical of large, fast-growing web and mobile apps. Available as an SLA-backed, fully managed IBM Cloud™ service, Cloudant elastically scales throughput and storage independently. Instantly deploy an instance, create databases and independently scale throughput capacity and data storage to meet your application requirements. Encrypt all data, with optional user-defined encryption key management through IBM Key Protect, and integrate with IBM Identity and Access Management. Get continuous availability as Cloudant distributes data across availability zones and 6 regions for app performance and disaster recovery requirements. Get continuous availability as Cloudant distributes data across availability zones and 6 regions for app performance and disaster recovery requirements.
  • 19
    BestCrypt
    Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them.
  • 20
    SetHero

    SetHero

    SetHero

    Production, without the stress. Film & TV production management software built for today, not yester-year. Tut Tut! Most call sheets are so hectic and confusing that King Tut is probably still trying to find his call time from within his crypt. He may have time to waste, but you and your crew are busy; you want to be able to just read the darn thing. Ah, that’s better! SetHero’s call sheets have all the industry standard elements packaged in a professional, modern design. Now anyone can read your call sheet — even those without a degree in ancient literature! Our templates were designed with the collaboration of dozens of industry professionals for this sole purpose: to create the best call sheet ever made. We reimagined call sheets from the ground up, designing something that is both truly beautiful and incredibly efficient. Unlike other modern call sheet designs, we don’t sacrific efficiency and industry standards for the sake of being “trendy”.
  • 21
    AWS Key Management Service
    AWS Key Management Service (KMS) is a managed service that facilitates the creation and control of cryptographic keys used to protect your data. It provides centralized management of keys and policies across integrated services and applications, allowing you to define permissions and monitor key usage. AWS KMS integrates with other AWS services, enabling seamless encryption of data stored within these services and control over access to the keys that decrypt it. Developers can utilize the AWS Encryption SDK to incorporate encryption and digital signature functionalities directly into their application code. AWS KMS supports the generation and verification of hash-based message authentication codes to ensure message integrity and authenticity. The service employs hardware security modules validated under the U.S. National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) 140-2 Cryptographic Module Validation Program.
  • 22
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 23
    SafeKit

    SafeKit

    Eviden

    Evidian SafeKit is a high-availability software solution designed to ensure the redundancy of critical applications on Windows and Linux platforms. It provides an all-in-one approach by integrating load balancing, synchronous real-time file replication, automatic application failover, and automated failback after a server failure, all within a single software product. This eliminates the need for additional hardware components such as network load balancers or shared disks, as well as the necessity for enterprise editions of operating systems and databases. SafeKit's software clustering facilitates the creation of mirror clusters with real-time data replication and failover, farm clusters with load balancing and failover, and advanced architectures like farm+mirror clusters and active-active clusters. Its shared-nothing architecture simplifies deployment, even in remote sites, by avoiding the complexities associated with shared disk clusters.
  • 24
    TokenEx

    TokenEx

    TokenEx

    Alongside Payment Card Information (PCI), Personally Identifiable Information (PII) also known as personal information and Protected Health Information (PHI) have become a favorite target of hackers. TokenEx can tokenize any type of data, so PII, PHI, PCI, ACH, etc. can be safely vaulted away from business systems and replaced with tokens that are mathematically unrelated to the original data and, thus, useless to data thieves. Tokenization offers virtually unlimited flexibility in how you store, access, and secure your sensitive data sets.
  • 25
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 26
    Oracle Container Engine for Kubernetes
    Container Engine for Kubernetes (OKE) is an Oracle-managed container orchestration service that can reduce the time and cost to build modern cloud native applications. Unlike most other vendors, Oracle Cloud Infrastructure provides Container Engine for Kubernetes as a free service that runs on higher-performance, lower-cost compute shapes. DevOps engineers can use unmodified, open source Kubernetes for application workload portability and to simplify operations with automatic updates and patching. Deploy Kubernetes clusters including the underlying virtual cloud networks, internet gateways, and NAT gateways with a single click. Automate Kubernetes operations with web-based REST API and CLI for all actions including Kubernetes cluster creation, scaling, and operations. Oracle Container Engine for Kubernetes does not charge for cluster management. Easily and quickly upgrade container clusters, with zero downtime, to keep them up to date with the latest stable version of Kubernetes.
  • 27
    Box KeySafe
    Securely manage your own encryption keys. With Box KeySafe, you have complete, independent control over your encryption keys. All key usage is unchangeable and includes a detailed record of key usage, so you can track exactly why your organization’s keys are being accessed — with no impact on user experience. If you ever see suspicious activity, your security team can cut off access to the content at any time. And it's all on top of the enterprise-grade security and compliance you get with the leading Content Cloud. We leverage Key Management Services (KMS) from Amazon Web Services (AWS) and Google Cloud Platform (GCP) to help you manage your encryption keys. Box KeySafe supports AWS KMS Custom Key Store and GCP Cloud HSM KMS to provide the control and protection of a dedicated hardware security module (HSM), without requiring you to manage any hardware.
    Starting Price: $130 per month
  • 28
    J-KMS

    J-KMS

    JISA Softech

    JISA Softech's J-KMS is a centralized key management system designed to streamline the management of cryptographic keys across various business applications. It automates key updates and distribution, handling the entire lifecycle of both symmetric and asymmetric keys. J-KMS enforces specific roles and responsibilities for key sets, reducing manual tasks and allowing staff to focus on policy decisions. It supports standard key formats and ensures compliance with standards like PCI-DSS and GDPR. Key functions include key generation, backup, restoration, distribution, import/export, audit logging, encryption using Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), and certification with X.509 or EMV certificates. Benefits of J-KMS encompass reduced human error through user and admin permissions, streamlined processes, cost reduction via automation, dual control with asynchronous workflows, tamper-evident records for compliance, and system-wide key control for any key type and format.
  • 29
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 30
    ClusterLion
    ClusterLion removes the need for complex clusters, shared storage, and other sophisticated infrastructure, ensuring business continuity and reducing costs. ClusterLion eliminates the need for complex clusters, significantly reducing costs and operational overhead. ClusterLion is currently available in two versions, ClusterLion for SAP and ClusterLion for MetroCluster. In case of failure, ClusterLion shuts down the affected side to avoid split-brain syndrome and then initiates the switch-over to the unaffected side. ClusterLion for MetroCluster ensures that the other services continue to function correctly after the storage switch-over has taken place. Ensure the security of your data without increasing the complexity of your infrastructure and the effort required to operate your systems. Thanks to complete infrastructure independence ClusterLion for MetroCluster is the only solution on the market that can address these concerns.
  • 31
    FlashGrid

    FlashGrid

    FlashGrid

    FlashGrid's software solutions are designed to enhance the reliability and performance of mission-critical Oracle databases across various cloud platforms, including AWS, Azure, and Google Cloud. By enabling active-active clustering with Oracle Real Application Clusters (RAC), FlashGrid ensures a 99.999% uptime Service Level Agreement (SLA), effectively minimizing business disruptions caused by database outages. Their architecture supports multi-availability zone deployments, safeguarding against data center failures and local disasters. FlashGrid's Cloud Area Network software facilitates high-speed overlay networks with advanced high availability and performance management capabilities, while their Storage Fabric software transforms cloud storage into shared disks accessible by all nodes in a cluster. The FlashGrid Read-Local technology reduces storage network overhead by serving read operations from locally attached disks, thereby enhancing performance.
  • 32
    Alibaba Cloud Server Load Balancer (SLB)
    Server Load Balancer (SLB) provides disaster recovery at four levels for high availability. CLB and ALB support built-in Anti-DDoS services to ensure business security. In addition, you can integrate ALB with WAF in the console to ensure security at the application layer. ALB and CLB support cloud-native networks. ALB is integrated with other cloud-native services, such as Container Service for Kubernetes (ACK), Serverless App Engine (SAE), and Kubernetes, and functions as a cloud-native gateway to distribute inbound network traffic. Monitors the condition of backend servers regularly. SLB does not distribute network traffic to unhealthy backend servers to ensure availability. Server Load Balancer (SLB) supports cluster deployment and session synchronization. You can perform hot upgrades and monitor the health and performance of machines in real-time. Supports multi-zone deployment in specific regions to provide zone-disaster recovery.
  • 33
    Vaultody

    Vaultody

    Vaultody

    Vaultody is a B2B SaaS platform delivering institutional-grade, non-custodial digital asset infrastructure for businesses operating across crypto and blockchain markets. Built on Vaultody’s in-house developed MPC (Multi-Party Computation) technology, the platform enables secure, resilient, and policy-driven digital asset operations while eliminating single points of failure and meeting the highest security standards on the market. Vaultody supports Treasury Management, Direct Custody, and Wallet-as-a-Service (WaaS) solutions through a unified, multi-chain environment designed for enterprise-scale operations. Organizations manage digital assets using role-based access controls, approval workflows, transaction policies, and audit-ready governance to ensure operational integrity and compliance. Vaultody serves financial institutions, fintechs, exchanges, payment platforms, hedge funds, venture capital firms, asset managers, and digital asset businesses.
  • 34
    Heroic

    Heroic

    Heroic

    Heroic is an open-source monitoring system originally built at Spotify to address problems faced with large scale gathering and near real-time analysis of metrics. Heroic uses a small set of components which are responsible for very specific things. Indefinite retention, as long as you have the hardware spend. Federation support to connect multiple Heroic clusters into a global interface. Heroic uses a small set of components which are responsible for very specific things. Consumers are the component responsible for consuming metrics. When building Heroic it was quickly realized that navigating hundreds of millions of time series without context is hard. Heroic has support for federating requests, which allows multiple independent Heroic clusters to serve clients through a single global interface. This can be used to reduce the amount of geographical traffic by allowing one cluster to operate completely isolated within its zone.
  • 35
    Skyflow

    Skyflow

    Skyflow

    Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data.
  • 36
    Yandex Managed Service for Elasticsearch
    Get access to new functionalities, security patches, and other Elasticsearch improvements with official subscriptions. You can deploy a ready-to-use cluster in just a few minutes. Elasticsearch and Kibana stack settings are initially optimized for the cluster size you selected. Invest your time in your project, and we’ll take care of cluster maintenance, software backups, monitoring, fault tolerance, and updates. Index sharding reduces the load on each host and makes it easy to scale a cluster under peak loads. It’s much easier to develop an infrastructure if you have a visual representation of system behavior. Create trends, make forecasts, and evaluate system stability in a user-friendly interface. To create fault-tolerant geo-distributed Elasticsearch and Kibana clusters, just select the number of hosts and specify availability zones. Select the necessary computing capacity and create a ready-to-use Elasticsearch cluster.
    Starting Price: $117.79 per month
  • 37
    Unbound CORE Identity Security
    Authenticate users and machines and protect PKI – seamlessly across all locations and devices. Create virtual enclaves for mobile and for desktop with maximum security and without sacrificing the user experience. Authenticate user access and identify simply and securely with CORE virtual secure enclave SDK. Mobile, desktop, or server-side enabled – CORE keeps credentials safe even if the user’s personal device is compromised. Build virtual smartcards, protect mobile apps, and more with pure software agility. Integrate strong two-factor and multi-factor authentication into a mobile app – no hardware, no one-time password, no software token required. Replace traditional smartcards with virtual ones to authenticate employees and reduce operational strain and total cost of ownership. Protect machine and human electronic identities and the root certificate authority which oversees them. Protecting PII with maximum security, best user experience.
  • 38
    Maxta

    Maxta

    Maxta

    Maxta Hyperconvergence software gives IT the freedom to choose servers and hypervisors, scale storage independent of compute, and run mixed workloads on the same cluster. Unlike hyperconverged appliances, with Maxta there’s no vendor lock-in, no refresh tax and no upgrade tax. Use existing servers, buy pre-configured servers, or a combination of both. Appliances have a hidden cost. Never repay for software when you refresh hardware. Most storage and even hyperconverged solutions can only manage policies at the LUN, volume, or cluster level. Maxta lets you run multiple applications on the same cluster without sacrificing performance or availability. Appliance-based hyperconverged solutions make you repurchase the software license when you refresh hardware and add storage capacity only by adding additional appliances. You own your Maxta software forever and can add storage capacity by adding additional drives to servers.
  • 39
    Tetrate

    Tetrate

    Tetrate

    Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network.
  • 40
    Universal SSH Key Manager

    Universal SSH Key Manager

    SSH Communications Security

    Secure your business with a proven zero trust key(less) management solution. Discover and manage all your SSH keys and accounts to mitigate risks. Reduce complexity with automation features. Never fail an IT audit again due to unmanaged SSH keys. SSH keys are credentials just like passwords but 10 times more common and unmanaged. We scanned a financial institution's environment. That death star is the result. Their Privileged Access Management (PAM) security controls were being bypassed with unauthorized, test-to-production, and application-to-application connections. SSH keys are complex and can easily go unmanaged. These unmanaged SSH keys are then highly sought after by malicious actors. With UKM, you remove security risks caused by ungoverned keys that might look legitimate to your existing security controls. With UKM, you manage and discover all authentication keys, key configurations, and SSH login files in a centralized, universal SSH key manager.
  • 41
    Foundry

    Foundry

    Foundry

    Foundry is a new breed of public cloud, powered by an orchestration platform that makes accessing AI compute as easy as flipping a light switch. Explore the high-impact features of our GPU cloud services designed for maximum performance and reliability. Whether you’re managing training runs, serving clients, or meeting research deadlines. Industry giants have invested for years in infra teams that build sophisticated cluster management and workload orchestration tools to abstract away the hardware. Foundry makes this accessible to everyone else, ensuring that users can reap compute leverage without a twenty-person team at scale. The current GPU ecosystem is first-come, first-serve, and fixed-price. Availability is a challenge in peak times, and so are the puzzling gaps in rates across vendors. Foundry is powered by a sophisticated mechanism design that delivers better price performance than anyone on the market.
  • 42
    Yandex Managed Service for Apache Kafka
    Focus on developing data stream processing applications and don’t waste time maintaining the infrastructure. Managed Service for Apache Kafka is responsible for managing Zookeeper brokers and clusters, configuring clusters, and updating their versions. Distribute your cluster brokers across different availability zones and set the replication factor to ensure the desired level of fault tolerance. The service analyzes the metrics and status of the cluster and automatically replaces it if one of the nodes fails. For each topic, you can set the replication factor, log cleanup policy, compression type, and maximum number of messages to make better use of computing, network, and disk resources. You can add brokers to your cluster with just a click of a button to improve its performance, or change the class of high-availability hosts without stopping them or losing any data.
  • 43
    UKM Universal SSH Key Manager

    UKM Universal SSH Key Manager

    Software Diversified Services

    UKM discovers, remediates, and manages SSH user keys without interrupting business systems or impeding workflow. UKM finds and tracks existing keys, verifies trusted connections, renews authorizations, and removes inactive keys as needed. No changes to processes, no guessing about compliance. And it cuts costs along the way. UKM is the solution for any size business that is concerned about managing and safeguarding the secure shell environment. UKM automatically traces SSH key usage and updates authorizations while detecting and removing potentially dangerous, unused keys. All without disrupting operations. Eliminate all the overhead costs related to SSH keys by centralizing oversight and automating administration. Savings can reach millions of dollars per year. While SSH is the gold standard for securing data transfers, improperly managed SSH keys represent a significant security risk. UKM solves this issue and assures compliance.
  • 44
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 45
    Yandex Managed Service for Redis
    You can deploy a ready-to-use cluster in just a few minutes. DB settings are initially optimized for the cluster size you selected. If the load on your cluster increases, you can add new servers or increase their capacity in a matter of minutes. Redis stores data in key-value format, supported values include strings, arrays, dictionaries, sets, bitmasks, and other types. Redis runs in RAM and is therefore suitable for tasks that require a quick response or involve performing a large number of operations on a relatively small amount of data. Backups of database contents are GPG-encrypted. Data is secured in accordance with the requirements of local regulatory, GDPR, and ISO industry standards. Set a time limit for Yandex Managed Service for Redis to automatically delete data and optimize your data storage costs.
  • 46
    Karpenter
    Karpenter simplifies Kubernetes infrastructure with the right nodes at the right time. Karpenter is an open source, high-performance Kubernetes cluster autoscaler that simplifies infrastructure management by automatically launching the appropriate compute resources to handle your cluster's applications. Designed to leverage the full potential of the cloud, Karpenter enables fast and straightforward compute provisioning for Kubernetes clusters. It enhances application availability by swiftly responding to changes in application load, scheduling, and resource requirements, efficiently placing new workloads onto a variety of available computing resources. By identifying opportunities to remove under-utilized nodes, replace costly nodes with more economical alternatives, and consolidate workloads onto more efficient compute resources, Karpenter effectively reduces cluster compute costs.
  • 47
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 48
    HPE Performance Cluster Manager

    HPE Performance Cluster Manager

    Hewlett Packard Enterprise

    HPE Performance Cluster Manager (HPCM) delivers an integrated system management solution for Linux®-based high performance computing (HPC) clusters. HPE Performance Cluster Manager provides complete provisioning, management, and monitoring for clusters scaling up to Exascale sized supercomputers. The software enables fast system setup from bare-metal, comprehensive hardware monitoring and management, image management, software updates, power management, and cluster health management. Additionally, it makes scaling HPC clusters easier and efficient while providing integration with a plethora of 3rd party tools for running and managing workloads. HPE Performance Cluster Manager reduces the time and resources spent administering HPC systems - lowering total cost of ownership, increasing productivity and providing a better return on hardware investments.
  • 49
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 50
    Azure Kubernetes Fleet Manager
    Easily handle multicluster scenarios for Azure Kubernetes Service (AKS) clusters such as workload propagation, north-south load balancing (for traffic flowing into member clusters), and upgrade orchestration across multiple clusters. Fleet cluster enables centralized management of all your clusters at scale. The managed hub cluster takes care of the upgrades and Kubernetes cluster configuration for you. Kubernetes configuration propagation lets you use policies and overrides to disseminate objects across fleet member clusters. North-south load balancer orchestrates traffic flow across workloads deployed in multiple member clusters of the fleet. Group any combination of your Azure Kubernetes Service (AKS) clusters to simplify multi-cluster workflows like Kubernetes configuration propagation and multi-cluster networking. Fleet requires a hub Kubernetes cluster to store configurations for placement policy and multicluster networking.
    Starting Price: $0.10 per cluster per hour