55 Integrations with HashiCorp Vault
View a list of HashiCorp Vault integrations and software that integrates with HashiCorp Vault below. Compare the best HashiCorp Vault integrations as well as features, ratings, user reviews, and pricing of software that integrates with HashiCorp Vault. Here are the current HashiCorp Vault integrations in 2026:
-
1
Cycloid
Cycloid
Cycloid is the unified Internal Developer Portal and Platform, made for platform engineering done right. Accelerate your platform engineering adoption from years to weeks, optimize the developer experience and operational efficiency by accelerating the delivery of a developer portal and platform, lighten the cognitive load on IT teams, and advocate for FinOps & Green IT practices. With a GitOps first approach, Cycloid is the single source of truth for your organization. Sovereign by design, we help you take control of your cloud choices and data, ensuring security, compliance, flexibility, and freedom from vendor lock-in at every step. And with GreenIT practices at our core, you'll build an efficient, responsible, and future-proof reality. We are the editor of OSS projects TerraCognita: reverse Terraform; InfraMap: infra diagram; and Terracost: cost estimation. We work with global organizations, US and European public institutions and 6 of the top 10 SI service providers.Starting Price: $32 -
2
StrongDM
StrongDM
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures. - We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out. - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.Starting Price: $70/user/month -
3
Netdata
Netdata, Inc.
The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: 💥 Collects metrics from 800+ integrations 💪 Real-Time, Low-Latency, High-Resolution 😶🌫️ Unsupervised Anomaly Detection 🔥 Powerful Visualization 🔔 Out of box Alerts 📖 systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.Starting Price: Free -
4
Kubernetes
Kubernetes
Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.Starting Price: Free -
5
GitHub
GitHub
GitHub is the world’s most secure, most scalable, and most loved developer platform. Join millions of developers and businesses building the software that powers the world. Build with the world’s most innovative communities, backed by our best tools, support, and services. If you manage multiple contributors , there’s a free option: GitHub Team for Open Source. We also run GitHub Sponsors, where we help fund your work. The Pack is back. We’ve partnered up to give students and teachers free access to the best developer tools—for the school year and beyond. Work for a government-recognized nonprofit, association, or 501(c)(3)? Get a discounted Organization account on us.Starting Price: $7 per month -
6
MongoDB
MongoDB
MongoDB is a general purpose, document-based, distributed database built for modern application developers and for the cloud era. No database is more productive to use. Ship and iterate 3–5x faster with our flexible document data model and a unified query interface for any use case. Whether it’s your first customer or 20 million users around the world, meet your performance SLAs in any environment. Easily ensure high availability, protect data integrity, and meet the security and compliance standards for your mission-critical workloads. An integrated suite of cloud database services that allow you to address a wide variety of use cases, from transactional to analytical, from search to data visualizations. Launch secure mobile apps with native, edge-to-cloud sync and automatic conflict resolution. Run MongoDB anywhere, from your laptop to your data center.Starting Price: Free -
7
Devolutions Remote Desktop Manager
Devolutions
Remote access tools can be messy—different clients, unmanaged credentials, and no clear visibility. Remote Desktop Manager changes that. It centralizes all your remote connections in one place, with support for RDP (Remote Desktop Protocol), SSH (Secure Shell), Telnet, VPNs (Virtual Private Network), and many other protocols. Users get cross-platform access from Windows, macOS, Linux, and mobile. Sessions can be launched in 1 click, while credentials are stored in shared or personal vaults. All activity is tracked, and role-based access control ensures least-privilege enforcement. The Remote Connection & IT Management package enhances RDM with Devolutions Gateway for secure, just-in-time tunnels; Hub or Server for credential storage; and session audit logs to meet compliance requirements. Everything integrates seamlessly through RDM’s interface. It’s a streamlined, policy-driven solution for IT teams that want full control over remote access without bouncing between tools.Starting Price: $30/month/user -
8
Amazon Web Services (AWS)
Amazon
Amazon Web Services (AWS) is the world’s most comprehensive cloud platform, trusted by millions of customers across industries. From startups to global enterprises and government agencies, AWS provides on-demand solutions for compute, storage, networking, AI, analytics, and more. The platform empowers organizations to innovate faster, reduce costs, and scale globally with unmatched flexibility and reliability. With services like Amazon EC2 for compute, Amazon S3 for storage, SageMaker for AI/ML, and CloudFront for content delivery, AWS covers nearly every business and technical need. Its global infrastructure spans 120 availability zones across 38 regions, ensuring resilience, compliance, and security. Backed by the largest community of customers, partners, and developers, AWS continues to lead the cloud industry in innovation and operational expertise. -
9
Microsoft Azure
Microsoft
Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it. -
10
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
11
MySQL
Oracle
MySQL is the world's most popular open source database. With its proven performance, reliability, and ease-of-use, MySQL has become the leading database choice for web-based applications, used by high profile web properties including Facebook, Twitter, YouTube, and all five of the top five websites*. Additionally, it is an extremely popular choice as embedded database, distributed by thousands of ISVs and OEMs.Starting Price: Free -
12
Apache Cassandra
Apache Software Foundation
The Apache Cassandra database is the right choice when you need scalability and high availability without compromising performance. Linear scalability and proven fault-tolerance on commodity hardware or cloud infrastructure make it the perfect platform for mission-critical data. Cassandra's support for replicating across multiple datacenters is best-in-class, providing lower latency for your users and the peace of mind of knowing that you can survive regional outages. -
13
Google Cloud CDN
Google
Google Cloud CDN is the fast, reliable web and video content delivery with global scale and reach. Global distribution with anycast IP. With edge caches peered with nearly every major end-user ISP globally, Cloud CDN offers connectivity to more users everywhere. Thanks to anycast architecture, your site gets a single global IP address, combining consistent performance worldwide with easy management. Optimized for last-mile performance. As a complement to Google Cloud’s high-performance private network, Cloud CDN supports modern protocols originally developed at Google, like HTTP/2 and QUIC, to improve site performance for mobile users and/or users in emerging markets. Integrated with Google Cloud. Cloud CDN is tightly integrated with Cloud Monitoring and Cloud Logging, providing detailed latency metrics out of the box, as well as raw HTTP request logs for deeper visibility. Logs can be exported into Cloud Storage and/or BigQuery for further analysis with just a few clicks. -
14
Alibaba Cloud
Alibaba
As a business unit of Alibaba Group (NYSE: BABA), Alibaba Cloud provides a comprehensive suite of global cloud computing services to power both our international customers’ online businesses and Alibaba Group’s own e-commerce ecosystem. In January 2017, Alibaba Cloud became the official Cloud Services Partner of the International Olympic Committee. By harnessing, and improving on, the latest cloud technology and security systems, we tirelessly work towards our vision - to make it easier for you to do business anywhere, with anyone in the world. Alibaba Cloud provides cloud computing services for large and small businesses, individual developers, and the public sector in over 200 countries and regions. -
15
Opsera
Opsera
You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. Contextualized logs for faster resolution and improved auditing and compliance.Starting Price: $3.60 per user , Min 300 devs -
16
QSE
QSE Group
QSE Group delivers quantum-resilient cybersecurity solutions designed to protect sensitive data from both current and future threats, including quantum computing. Using post-quantum cryptographic algorithms aligned with NIST standards, QSE secures data through encryption, key management, and secure communications. Built with an API-first design, it integrates easily into existing cloud, on-prem, or hybrid environments. Core features include secure entropy generation, zero trust policy enforcement, and compatibility with identity systems and SIEM tools. QSE also supports white-label deployment for SaaS vendors and MSPs. With real-time monitoring, compliance-ready reporting, and applications across finance, healthcare, legal, and government sectors, QSE enables future-proof protection without disrupting current infrastructure. It's a practical, scalable solution for organizations serious about long-term data security.Starting Price: $19.90/month -
17
Acra
Cossack Labs
Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.Starting Price: $10000 per year -
18
JupiterOne
JupiterOne
JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing security infrastructure.Starting Price: $2000 per month -
19
Elastic Observability
Elastic
Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.Starting Price: $16 per month -
20
Kaholo
Kaholo
Scriptless CI/CD Automation for On-Demand Developer Portals Kaholo is a low-code IT workflow automation tool that empowers Developers to quickly self-serve environments and automate their workflows while giving Operators full visibility and control over compliance, security, and cloud costs. Key Capabilities: - Drag and drop low-code CI/CD pipelines - 150+ pre-built plugins that interact with external resources that anyone can use without proprietary knowledge, or custom-build your own - Orchestrate your existing CI/CD toolset to avoid the inefficient route of rip and replace - Extensive access permissions allow developers to safely work with and execute pipelines autonomously - Automate provisioning, testing, security scans, builds, deployments with various rollout strategies, rollbacks, cleanups, updates, troubleshooting, remediations, migrations, and more. - Integrations with all cloud providers as well on-prem environmentsStarting Price: $99 per month -
21
Coder
Coder
Coder is the AI software development company leading the future of autonomous coding. We empower teams to build software faster, more securely, and at scale through the collaboration of AI coding agents and human developers. Our mission is to make agentic AI a safe, trusted, and integral part of every software development lifecycle. Coder’s self-hosted Cloud Development Environment (CDE) is the foundation for deploying agentic AI in the enterprise. It provides a secure, standardized, and governed workspace to deploy autonomous coding agents alongside human developers, accelerating innovation while maintaining control and compliance. Coder's isolated, policy-driven environments improve productivity, cut cloud costs, and reduce data risks. Developers transition to AI at their own pace using their own tools. Platform and security teams can govern, audit, and manage a great developer experience at scale. -
22
Nirmata
Nirmata
Deploy production-ready Kubernetes clusters in days. Rapidly onboard users and applications. Conquer Kubernetes complexity with an intuitive and powerful DevOps solution. Eliminate friction between teams, enhance alignment, and boost productivity. With Nirmata’s Kubernetes Policy Manager, you’ll have the right security, compliance and Kubernetes governance to scale efficiently. Manage all your Kubernetes clusters, policies, and applications in one place while streamling operations with the DevSecOps Platform. Nirmata’s DevSecOps platform integrates with cloud providers (EKS, AKS, GKE, OKE, etc.) and infrastructure-based solutions (VMware, Nutanix, bare metal) and solves Kubernetes operations challenges for enterprise DevOps teams with powerful Kubernetes management and governance capabilities.Starting Price: $50 per node per month -
23
ZenML
ZenML
Simplify your MLOps pipelines. Manage, deploy, and scale on any infrastructure with ZenML. ZenML is completely free and open-source. See the magic with just two simple commands. Set up ZenML in a matter of minutes, and start with all the tools you already use. ZenML standard interfaces ensure that your tools work together seamlessly. Gradually scale up your MLOps stack by switching out components whenever your training or deployment requirements change. Keep up with the latest changes in the MLOps world and easily integrate any new developments. Define simple and clear ML workflows without wasting time on boilerplate tooling or infrastructure code. Write portable ML code and switch from experimentation to production in seconds. Manage all your favorite MLOps tools in one place with ZenML's plug-and-play integrations. Prevent vendor lock-in by writing extensible, tooling-agnostic, and infrastructure-agnostic code.Starting Price: Free -
24
BotCity
BotCity
With the proliferation of user-created Python scripts and AIs outside of IT governance, companies face increasing risks of Shadow IT, such as security breaches, compliance issues, and loss of operational control. BotCity solves this scenario with a centralized governance platform, enterprise orchestration, and real-time visibility into all Python automations, including AI-driven ones. In addition, it enables you to accelerate hyperautomation initiatives with RPA and AI, reduce costs (up to 5x lower than low-code platforms), and run bots flexibly on VMs, containers, and serverless environments, with support for systems such as SAP, Citrix, Windows, and Linux. Free 30-day trial available.Starting Price: 30-day trial -
25
authentik
authentik
authentik is an open source identity provider that unifies your identity needs into a single platform, replacing Okta, Active Directory, and Auth0. Authentik Security is a public benefit company that is building on top of the open-source project. Using a self-hosted, open-source identity provider means prioritizing security and taking control of your most sensitive data. With authentik, you no longer need to continually place your trust in a third-party service. Adopt authentik to your environment, regardless of your requirements. Use our APIs and fully customizable policies to automate any workflow. Simplify deployment and scaling with prebuilt templates and support for Kubernetes, Terraform, and Docker Compose. No need to rely on a third-party service for critical infrastructure or expose your sensitive data to the public internet. Use our pre-built workflows, or customize every step of authentication through configurable templates, infrastructure as code, and comprehensive APIs.Starting Price: $0.02 per month -
26
Brainboard
Brainboard
Brainboard is an AI-driven platform designed for cloud architects, DevOps teams, and platform engineers to visually design, deploy, and manage multi-cloud infrastructures while automatically generating Infrastructure as Code. With support for major cloud providers and deep integration with Terraform/OpenTofu, users can drag-and-drop architecture diagrams that are instantly translated into ready-to-use Terraform code, enabling “design first, code when needed”. The platform also includes features such as CI/CD pipelines tailored for infrastructure, drift detection, versioning, and role-based access controls to ensure governance, consistency, and collaboration across teams. Brainboard supports the creation of reusable service-catalog templates, enabling internal teams to self-provision validated, compliant infrastructure without constant reliance on central DevOps.Starting Price: $99 per month -
27
Google Cloud’s Confidential Computing delivers hardware-based Trusted Execution Environments to encrypt data in use, completing the encryption lifecycle alongside data at rest and in transit. It includes Confidential VMs (using AMD SEV, SEV-SNP, Intel TDX, and NVIDIA confidential GPUs), Confidential Space (enabling secure multi-party data sharing), Google Cloud Attestation, and split-trust encryption tooling. Confidential VMs support workloads in Compute Engine and are available across services such as Dataproc, Dataflow, GKE, and Vertex AI Workbench. It ensures runtime encryption of memory, isolation from host OS/hypervisor, and attestation features so customers gain proof that their workloads run in a secure enclave. Use cases range from confidential analytics and federated learning in healthcare and finance to generative-AI model hosting and collaborative supply-chain data sharing.Starting Price: $0.005479 per hour
-
28
TeamCity
JetBrains
Powerful Continuous Integration out of the box. Define up to 100 build configurations (jobs) and run unlimited builds. Run up to 3 builds concurrently. Add extra agents when necessary. Utilize the full potential of all the TeamCity features. This product includes features identical to those available to our largest customers. Receive peer support through the forum, alternatively file a bug or feature request, and vote for them in our public issue tracker. Unlimited users, unlimited build time. No strings attached. Build, check and run automated tests on the server even before committing your changes – keeping your code base clean at all times. Don’t wait for a build to finish to discover that something is wrong. Form your project tree to inherit parent settings and permissions. Create templates with common settings and inherit any number of build configurations from them.Starting Price: $18/month -
29
Protegrity
Protegrity
Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making. -
30
Keyfactor EJBCA
Keyfactor
EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution. -
31
Harness
Harness
Harness is an AI-native software delivery platform that helps engineering teams achieve excellence by automating and streamlining the entire software delivery lifecycle. It enables continuous integration, continuous delivery, and GitOps for multi-cloud, multi-region deployments with increased speed and reliability. Harness simplifies infrastructure as code, database DevOps, and artifact management to improve collaboration and reduce errors. The platform offers AI-powered testing, incident response, chaos engineering, and feature management to enhance quality and resilience. Harness also provides cloud cost management, security testing orchestration, and developer insights to optimize performance and governance. Trusted by leading enterprises, Harness accelerates innovation while reducing manual effort and risk. -
32
Rootly
Rootly
Rootly is an AI-native incident management platform built to help modern teams prevent and resolve incidents faster. It streamlines on-call scheduling, incident response, retrospectives, and status updates through intelligent automation and deep integrations with Slack, Teams, Jira, and Zoom. Powered by Rootly AI, the system automates root cause analysis, provides suggested fixes, and compiles incident data into clear summaries for faster recovery. Teams can manage incidents directly within their communication tools, reducing context switching and human error. With automated retrospectives and actionable insights, Rootly enables continuous improvement and reliability across engineering organizations. Trusted by global brands like Figma, Canva, Nvidia, and Webflow, it helps companies maintain uptime, minimize disruption, and create a culture of proactive resilience. -
33
Jovu
Amplication
Effortlessly build new services, and extend your existing applications with Amplication AI. Go from idea to production in four minutes. AI-powered assistant that generates production-ready code, ensuring consistency, predictability, and adherence to the highest standards. The transition from concept to deployment in minutes with production-ready code that’s built to scale. Amplication’s AI delivers more than prototypes, get fully operational, robust backend services ready to go live. Streamline development workflows, reduce time, and optimize your resources. Do more with what you have with the power of AI. Input your requirements and watch Jovu translate them into ready-to-use code components. Production-ready data models, APIs, authentication, authorization, event-driven architecture, and everything else that is needed to get your service up and running. Add architecture components, and integrations and extend with the Amplication plugins. -
34
Juniper Apstra
Juniper Networks
Juniper Apstra intent-based networking software automates and validates the design, deployment, and operation of data center networks from day 0 through day 2+. As the only solution of its kind with multivendor support, Apstra empowers you to automate and manage your networks across virtually any data center design, vendor, and topology, making private data centers as easy as a cloud. Using Apstra’s single source of truth and powerful analytics, you can now deliver optimal network performance and resolve issues with confidence. Apstra also mitigates network outages with predictive insights and provides change control with networkwide rollback capabilities. Juniper Validated Designs (JVDs) help ensure reliable operations and accelerate deployments. Apstra Cloud Services, a suite of AI-native, cloud-based applications for AI operations (AIOps), works with Apstra’s intent-based networking to expand data center assurance solutions from network assurance to application assurance. -
35
KeyRunner
Launchiam
The Platform to Build, Test & Secure APIs. Transform how you design, test, and manage APIs. Collaborate easily, run tests locally, and protect sensitive data every step of the way. No Signup or Login Get started instantly—no need for lengthy sign-ups or logins. VS Code Extension & Desktop Apps Work where you're comfortable! Our VS Code extension and desktop apps integrate seamlessly with your existing workflow. Local Storage & Execution Keep data secure with local storage and execution, ensuring sensitive information stays on your device. Run Unlimited Collections Test and manage unlimited API collections, enabling effortless scaling for all your projects. Mock Servers Streamline development by creating mock servers for fast testing and API response simulation. Scriptless Testing & Playground Simplify testing with our user-friendly interface—experiment with APIs without writing any code. Our enterprise features take it even further. Contact us!Starting Price: $39/month/user -
36
AWS Marketplace
Amazon
AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs. -
37
IBM Cloud Hyper Protect Crypto Services is an as-a-service key management and encryption solution, which gives you full control over your encryption keys for data protection. Experience a worry-free approach to multi-cloud key management through the all-in-one as-a-service solution and benefit from automatic key backups and built-in high availability to secure business continuity and disaster recovery. Manage your keys seamlessly across multiple cloud environments create keys securely and bring your own key seamlessly to hyperscalers such as Microsoft Azure AWS and Google Cloud Platform to enhance the data security posture and gain key control. Encrypt integrated IBM Cloud Services and applications with KYOK. Retain complete control of your data encryption keys with technical assurance and provide runtime isolation with confidential computing. Protect your sensitive data with quantum-safe measures by using Hyper Protect Crypto Services' Dillithium.
-
38
Astro by Astronomer
Astronomer
For data teams looking to increase the availability of trusted data, Astronomer provides Astro, a modern data orchestration platform, powered by Apache Airflow, that enables the entire data team to build, run, and observe data pipelines-as-code. Astronomer is the commercial developer of Airflow, the de facto standard for expressing data flows as code, used by hundreds of thousands of teams across the world. -
39
Tectia
SSH Communications Security
We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security. -
40
Kylo
Teradata
Kylo is an open source enterprise-ready data lake management software platform for self-service data ingest and data preparation with integrated metadata management, governance, security and best practices inspired by Think Big's 150+ big data implementation projects. Self-service data ingest with data cleansing, validation, and automatic profiling. Wrangle data with visual sql and an interactive transform through a simple user interface. Search and explore data and metadata, view lineage, and profile statistics. Monitor health of feeds and services in the data lake. Track SLAs and troubleshoot performance. Design batch or streaming pipeline templates in Apache NiFi and register with Kylo to enable user self-service. Organizations can expend significant engineering effort moving data into Hadoop yet struggle to maintain governance and data quality. Kylo dramatically simplifies data ingest by shifting ingest to data owners through a simple guided UI. -
41
Keyfactor Command for IoT
Keyfactor
Keyfactor Command for IoT is a comprehensive identity management solution designed to secure IoT devices at scale. It automates the issuance, management, and lifecycle of IoT device certificates from manufacturing to end-of-life, ensuring each device remains trusted and secure throughout its lifespan. The platform offers centralized visibility to track and manage device identities, making it easier to maintain compliance, prevent security breaches, and reduce the risk of costly recalls. With features like automated provisioning, revocation, and integration with leading IoT platforms, Keyfactor Command for IoT simplifies device identity management across industries like automotive, healthcare, and manufacturing. -
42
Atom
Atom
We’re not most banks. In fact, we are the UK’s first app-based bank, here to make things better for you. Our award-winning customer service and competitive mortgage and savings rates keep our thousands of customers smiling. We’ve got what you’re looking for. All of our products are designed to be simple, straightforward and hassle-free. And because we don’t have to fork out for expensive branches, we can offer you better rates. At least one of our savings products was at the top of best buy table for a total of 116 days last year. Why not take a look at our range of savings products which are all protected under the FSCS. We offer competitive rates, advice on what’s best for you through our independent brokers and a process you can follow step-by-step, all in app. Take your savings and mortgages with you wherever you are, 24/7. We’ve done away with fiddly keypads and instead use your face and voice as your password. Simple. After all, we’re all about you. -
43
Ozone
Ozone
Ozone platform helps enterprises to ship modern applications quickly, securely and reliably. Ozone removes the unwanted headache of managing too many DevOps tools and makes it super easy for anyone to deploy applications on Kubernetes clusters. Just integrate all your existing DevOps tools and automate your application delivery process end-to-end. Accelerate deployments with automated pipeline workflows and on demand infrastructure management with zero downtime. Prevent business losses by enforcing governance and compliance policy for app deployments at scale. Single pane of glass where engineering, DevOps and Security teams can collaborate on application releases in realtime. -
44
Circonus IRONdb
Circonus
Circonus IRONdb makes it easy to handle and store unlimited volumes of telemetry data, easily handling billions of metric streams. Circonus IRONdb enables users to identify areas of opportunity and challenge in real time, providing forensic, predictive, and automated analytics capabilities that no other product can match. Rely on machine learning to automatically set a “new normal” as your data and operations dynamically change. Circonus IRONdb integrates with Grafana, which has native support for our analytics query language. We are also compatible with other visualization apps, such as Graphite-web. Circonus IRONdb keeps your data safe by storing multiple copies of your data in a cluster of IRONdb nodes. System administrators typically manage clustering, often spending significant time maintaining it and keeping it working. Circonus IRONdb allows operators to set and forget their cluster, and stop wasting resources manually managing their time series data store. -
45
Phosphorus
Phosphorus Cybersecurity
Phosphorus is the backbone tool to secure the rapidly growing and often unmonitored enterprise IoT landscape. Providing visibility down to the device model and firmware version, Phosphorus gives you full, granular visibility into all embedded devices on your network. Phosphorus’s patented capabilities allow you to update all of your IoT devices to the latest firmware and rotate credentials at the click of a button. Unlike traditional scanners that search for vulnerabilities or require expensive Spanports, Phosphorus’s scanner provides light-touch detection of all IP-enabled IoT devices on your network without “knocking them over”. Gain full enterprise protection with our solutions. Audit IoT inventories. Meet compliance requirements and industry regulations. Automate key tasks like policy enforcement and patching updates – all at a fraction of the cost. -
46
Anitian FedRAMP Comprehensive
Anitian
Anitian’s FedRAMP Comprehensive solution combines best-of-breed web security technologies, compliant-by-design integrations, and guidance from FedRAMP experts to help SaaS providers Navigate, Accelerate, and Automate their FedRAMP program. Rely on Anitian’s proven expertise to guide you through every step of the FedRAMP process. Obtain FedRAMP authorization in half the time and at half the cost using Anitian’s unique combination of automation and in-person assistance. Use Anitian’s pre-built security stack and automation tools to eliminate much of the manual, complex work typically required for FedRAMP authorization. Depend on Anitian’s compliance team to keep both your internal and external stakeholders fully appraised of project status, required actions and critical path dependencies. -
47
GaraSign
Garantir
There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc. -
48
Worldr
Worldr
Worldr defends the data you share in Microsoft Teams from external breaches while prohibiting outside organizations from exploiting your most sensitive digital assets. It can be utilized in any environment, whether that be cloud based or on-premise; our lightweight architecture can be deployed in minutes for any size organization. Ensure full ownership of data so no one, not even Microsoft, can access it. Messages, user details, and metadata are stored in a database protected by a transparent data encryption layer while encryption keys are stored in Hashicorp Vault. Store your data anywhere in the world based on compliance, legal or regulatory requirements. Adhere to sector specific data transfer and processing regulations and meet mandates enforced by various countries to ensure data sovereignty. -
49
Procyon
Procyon
Get frictionless, secure access to cloud infrastructure. Get passwordless access to major cloud platforms and thousands of cloud resources. We work seamlessly with AWS, GCP, Azure, and other cloud-native tools. Stop overprivileged access with just-in-time access for developers. DevOps users can request access to cloud resources with ‘just enough privileges’ to get timebound access to resources. Eliminate productivity bottlenecks of a centralized administrator. Configure approval policies based on a variety of factors. View a catalog of granted and unaccessed resources. Stop credential sprawl and worrying about credential theft. Developers can get passwordless access to cloud resources using Trusted Platform Module (TPM) based technology. Discover potential vulnerabilities now with our free assessment tool and understand how Procyon can help solve the problem in a matter of hours. Leverage TPM to strongly identify users and devices. -
50
CertSecure Manager
Encryption Consulting LLC
An all-in-one solution for certificate management that helps to automate and seamlessly manage all certificates across different Cloud Environments, On-Premises, Hybrid IT Environments and Kubernetes Clusters. It manages certificates during entire lifecycle including certificate issuance, monitoring, renewal and revocation.