Alternatives to Yandex Key Management Service
Compare Yandex Key Management Service alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Yandex Key Management Service in 2026. Compare features, ratings, user reviews, pricing, and more from Yandex Key Management Service competitors and alternatives in order to make an informed decision for your business.
-
1
Keeper Security
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com. -
2
Securden Password Vault for Enterprises
Securden, Inc
Securden Password Vault for Enterprises is a scalable, enterprise-grade credential management solution available in both cloud (SaaS) and on-premise deployments. It centralizes the storage of passwords, SSH keys, DevOps secrets, files, and other sensitive data in an AES-256 encrypted vault, helping organizations enforce strong security controls and defend against insider and external threats. The solution enables secure credential storage, granular access controls, automated password rotation, and just-in-time access while providing full visibility through audit logs, session recordings, and real-time alerts. IT teams can launch secure remote connections such as RDP, SSH, and SQL directly from the vault without exposing credentials. Trusted by enterprises worldwide, Securden helps organizations strengthen security posture, streamline credential governance, improve operational efficiency, and meet compliance requirements across industries. -
3
GitGuardian
GitGuardian
GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets lifecycle. The platform supports over 450+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF and Bouygues Telecom for robust secrets protection.Starting Price: $0 -
4
SharePass
SharePass
SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication tools. When it comes to your privacy, SharePass or any of its employees cannot see the content of your secrets; the secrets can be seen only by the exchanging parties. SharePass meets the latest cybersecurity compliance and regulations. In the era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating your digital footprint. SharePass supports SSO with Office365, Google Workspace, MFA, and integration with Yubikeys for maximum security.Starting Price: Free -
5
Doppler
Doppler
Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!Starting Price: $6 per seat per month -
6
Yandex Lockbox
Yandex
Create secrets in the management console or using the API. Your secrets are safely stored in one place, easily integrated with your cloud services, and accessible via external systems over the gRPC or REST API. Encrypt your secrets using Yandex Key Management Service keys. Secrets are only stored in encrypted form. You can choose pre-configured service roles to ensure granular access to your secrets. Set up access permissions to read or manage your secret or its metadata. Create a secret, select a Key Management Service (KMS) key, and securely store your login-password pairs and other sensitive information. A secret may contain any of your confidential information, e.g. a login-password pair, server certificate keys, or cloud service account keys. Each secret stored by the service can have multiple versions of stored data. The service stores this data securely in encrypted form. All secrets are replicated in three availability zones.Starting Price: $0.0277 per 10000 operations -
7
Akeyless Identity Security Platform
Akeyless
Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers identity intelligence to surface risky access and strengthen oversight. -
8
HashiCorp Vault
HashiCorp
Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve. -
9
Azure Key Vault
Microsoft
Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection. -
10
Confidant
Confidant
Confidant is a open source secret management service that provides user-friendly storage and access to secrets in a secure way, from the developers at Lyft. Confidant solves the authentication chicken and egg problem by using AWS KMS and IAM to allow IAM roles to generate secure authentication tokens that can be verified by Confidant. Confidant also manages KMS grants for your IAM roles, which allows the IAM roles to generate tokens that can be used for service-to-service authentication, or to pass encrypted messages between services. Confidant stores secrets in an append-only way in DynamoDB, generating a unique KMS data key for every revision of every secret, using Fernet symmetric authenticated cryptography. Confidant provides an AngularJS web interface that allows end-users to easily manage secrets, the mappings of secrets to services and the history of changes. -
11
Hemmelig.app
Hemmelig.app
Hemmelig lets you share secrets securely with encrypted messages that automatically self-destruct after being read. Paste a password, confidential message, or private data. Ensure your sensitive data remains encrypted, secure, and confidential. The secret link, by default, is a one-time use only, after which it will vanish. Hemmelig, [he`m:(ə)li], means secret in Norwegian.Starting Price: Free -
12
Knox
Pinterest
Knox is a secret management service. Knox is a service for storing and rotation of secrets, keys, and passwords used by other services. Pinterest has a plethora of keys or secrets doing things like signing cookies, encrypting data, protecting our network via TLS, accessing our AWS machines, communicating with our third parties, and many more. If these keys become compromised, rotating (or changing our keys) used to be a difficult process generally involving a deploy and likely a code change. Keys/secrets within Pinterest were stored in git repositories. This means they were copied all over our company's infrastructure and present on many of our employees laptops. There was no way to audit who accessed or who has access to the keys. Knox was built to solve these problems. Ease of use for developers to access/use confidential secrets, keys, and credentials. Confidentiality for secrets, keys, and credentials. Provide mechanisms for key rotation in case of compromise. -
13
Password.link
Password.link
The link can only be opened once. This ensures nobody has opened it before the recipient and nobody can open it again afterward. The encrypted secret is deleted from our database when it has been viewed. There's no way to view it again. Sending secrets in plain text exposes them to threats even after the message has been long forgotten. Using a one-time link ensures that there are no valid credentials lying around in email inboxes or archived instant messages. Half of the encryption key is stored in the link itself and never seen by us or anyone else. Viewing the secret is not possible without the original link. Using our service you can create a one-time link to the credentials and be sure nobody sees them before the recipient. You can also configure notifications to be sent via different channels so you know when the credentials have been viewed, and by who.Starting Price: €8.99 per month -
14
Google Cloud Key Management
Google
Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys. -
15
InPrivy
InPrivy
Easily share sensitive information with co-workers, clients, friends, and family. Use InPrivy to share passwords and other sensitive information in a secure way. Prevent your confidential data to remain fully visible in email conversations or chats. Sharing private notes, passwords, API keys, credit card information or any other kind of sensitive data should be done in a safe way. When sending them via email or messengers, your data remains visible and accessible for a long time. Start sharing the secure way, and use InPrivy. No ads, no excessive user tracking, and made in Germany. We ensure robust protection of your sensitive information. Use anywhere on the web, without installing any apps. You are the only one who knows the link to the secret information you created. Give it to the person who should see it. The links are encrypted with SSL and can only be used once by default. The secret information is also kept safe using strong AES-256 encryption.Starting Price: €30 per year -
16
SecretHub
SecretHub
Upgrade security throughout the stack with a unified secrets management platform that every engineer can use – from admin to intern. Putting passwords and API keys in source code creates a security risk. But handling them properly creates complexity that makes it extremely cumbersome to deploy. Git, Slack, and email are designed to share information, not to keep secrets. Copy-pasting values and waiting on that one admin who holds all the keys simply don't scale when you're deploying software multiple times a week. It's impossible to track who accessed what secrets at what time, making compliance audits a nightmare. Eliminate secrets in source code by replacing plaintext values with a reference to the secret. SecretHub then automatically loads secrets into your app the moment it starts. Use the CLI to encrypt and store secrets and then simply tell the code where to look for the secret. Your code is now free of secrets and can be shared with everyone on your team.Starting Price: $99 per month -
17
Keywhiz
Keywhiz
Keywhiz is a system for managing and distributing secrets. It can fit well with a service oriented architecture (SOA). Here is an overview in presentation format. Common practices include putting secrets in config files next to code or copying files to servers out-of-band. The former is likely to be leaked and the latter difficult to track. Keywhiz makes managing secrets easier and more secure. Keywhiz servers in a cluster centrally store secrets encrypted in a database. Clients use mutually authenticated TLS (mTLS) to retrieve secrets they have access to. Authenticated users administer Keywhiz via CLI. To enable workflows, Keywhiz has automation APIs over mTLS. Every organization has services or systems that require secrets. Secrets like TLS certificates/keys, GPG keys, API tokens, database credentials. Keywhiz is reliable and used in production, however occasional changes may break API backward compatibility. -
18
qProtect
QuintessenceLabs
qProtect™ delivers powerful data protection for the most sensitive and critical assets, particularly when they are in uncontrolled environments. It offers a much-needed practical solution for the protection of critical mobile data. Capabilities include automatic secure erasure of one-time key material when recording data, and “virtual zeroization”, to protect confidential information wherever it is, now and into the future. Our product portfolio and strong technical partnerships deliver broad security capabilities for the strongest security posture, today and tomorrow. QuintessenceLabs quantum-enabled solutions integrate with today’s encryption technologies. Centralized and vendor-neutral encryption key management solution. Designed to easily address the toughest challenges in key management. Crypto agile is adaptable to quantum-resistant algorithms. The point-to-point protocol that uses specialized hardware to share secret keys over an optical link. -
19
Bravura Safe
Bravura Security
Bravura Safe is a zero-knowledge secret and passwords manager that centrally, consistently, and securely manages decentralized passwords, and secrets so your employees don't have to. It complements core password management solutions that organizations already use. Bravura Safe leverages two decades of Bravura Security’s enterprise cybersecurity solutions. Employees can securely send time-bound passwords for new accounts, encryption keys for files, or entire files without them being leaked or intercepted, and with only one password to their Bravura Safe to remember. The recent rising threat of organizational insiders being paid to help in cyberattacks combined with notoriously bad secret and password hygiene at an individual level is a cause for cybersecurity leaders to be concerned. While IT teams have focused on implementing strong SSO, password management, identity and even privileged access management solutions, the work-from-home world has caused shadow IT to explode. -
20
EncryptRIGHT
Prime Factors
EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.Starting Price: $0 -
21
Entropy Keycrypt
Quantum Entropy
Protect your essential digital assets with Entropy, offering a seamless and secure transition to your trusted circle in unforeseen circumstances. User-Friendly Security Entropy enables you to securely partition important information into discrete shares, each of which reveals nothing about your secret without the others. Distribute these to a select group of trusted individuals, who can then store them offline for added security. Long-Term Resilience With its robust security features, including 256-bit encryption, Entropy is well-suited for durable, decentralized offline storage, safeguarding your data from both online and specific offline threats.Starting Price: $24.99 -
22
Alliance Key Manager
Townsend Security
Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.Starting Price: $4,800 one-time payment -
23
keyhold.io
keyhold.io
Your clients send credentials via Slack. Your contractors have passwords in email threads. Chaos. keyhold.io is a zero-knowledge secret custody platform for teams who manage credentials that aren't theirs. Send secure request links, collect credentials encrypted before they reach our servers, and get full audit trails of every access. Built for MSPs, agencies, and anyone tired of sensitive access scattered across chat threads.Starting Price: £50/month -
24
Enigma Vault
Enigma Vault
Enigma Vault is your PCI level 1 compliant and ISO 27001 certified payment card, data, and file easy button for tokenization and encryption. Encrypting and tokenizing data at the field level is a daunting task. Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of encrypted values takes just milliseconds. Fully managed by us, we built a solution to scale with you and your needs. Enigma Vault encrypts and tokenizes data of all shapes and sizes. Enigma Vault offers true field-level protection; instead of storing sensitive data, you store a token. Enigma Vault provides the following services. Enigma Vault takes the mess out of crypto and PCI compliance. You no longer have to manage and rotate private keys nor deal with complex cryptography. -
25
Pulumi
Pulumi
Modern Infrastructure as Code. Create, deploy, and manage infrastructure on any cloud using familiar programming languages and tools. Many clouds, one workflow. Use the same language, tools, and workflow, on any cloud. Collaborate. Harmonize your engineering practices between developers and operators. Easy continuous delivery. Deploy from the CLI, or integrate with your favorite CI/CD system, and review all changes before they are made. Tame complexity. Gain visibility across all of your environments. Audit and secure. Know who changed what, when, and why. Enforce deployment policies with your identity provider of choice. Secrets management. Keep secrets safe with easy, built-in encrypted configuration. Familiar programming languages. Define infrastructure in JavaScript, TypeScript, Python, Go, or any .NET language, including C#, F#, and VB. Your favorite tools. Use familiar IDEs, test frameworks, and tools. Share and reuse. Codify best practices and policies. -
26
AWS Secrets Manager
Amazon
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets with a call to Secrets Manager APIs, eliminating the need to hardcode sensitive information in plain text. Secrets Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon DocumentDB. Also, the service is extensible to other types of secrets, including API keys and OAuth tokens. In addition, Secrets Manager enables you to control access to secrets using fine-grained permissions and audit secret rotation centrally for resources in the AWS Cloud, third-party services, and on-premises. AWS Secrets Manager helps you meet your security and compliance requirements by enabling you to rotate secrets safely without the need for code deployments.Starting Price: $0.40 per month -
27
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
28
Yandex Object Storage
Yandex
Objects in Object Storage are stored in multiple geographically distributed availability zones. Each replica is updated when you edit, create, or delete an object. To manage Object Storage, you can use tools that are compatible with Amazon S3, including the API, CLI, WinSCP, Java SDK, or Python SDK. To get started with Object Storage, go to the Yandex Cloud management console. Create and configure your first bucket. Drag files to the bucket screen to upload them. Physical media is located in Yandex data centers, which are highly secure facilities. Data is stored in an encrypted format and no one with access to the physical media can read the data. -
29
KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
-
30
NuCypher
NuCypher
Manage secrets such as IAM tokens, database and SSH credentials, and signing/encryption keys across dynamic environments. Conditionally grant and revoke access to sensitive data to arbitrary numbers of recipients. Process encrypted data while preserving the confidentiality of the inputs and results. NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols. NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes. Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data. -
31
AWS Key Management Service
Amazon
AWS Key Management Service (KMS) is a managed service that facilitates the creation and control of cryptographic keys used to protect your data. It provides centralized management of keys and policies across integrated services and applications, allowing you to define permissions and monitor key usage. AWS KMS integrates with other AWS services, enabling seamless encryption of data stored within these services and control over access to the keys that decrypt it. Developers can utilize the AWS Encryption SDK to incorporate encryption and digital signature functionalities directly into their application code. AWS KMS supports the generation and verification of hash-based message authentication codes to ensure message integrity and authenticity. The service employs hardware security modules validated under the U.S. National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) 140-2 Cryptographic Module Validation Program. -
32
IBM Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
-
33
KodeFile
1SQ Technologies
The hardest part of encryption is dealing with the encryption keys. Until now! KodeFile's Key On Demand Encryption (KODE) generates and stores a unique key for every file you encrypt. Then on demand, shares the secret keys with your Confidants so that they can decrypt. KodeFile never possesses your files. You separately store and share the files as you see fit (email, cloud, flash drive, etc.), ensuring you are always in control of your privacy. KodeFile generates and stores a unique key for every file you encrypt. Shares any key on demand. The keys are secret to everyone, ensuring they are never exposed and shared with unauthorized parties. -
34
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
-
35
J-KMS
JISA Softech
JISA Softech's J-KMS is a centralized key management system designed to streamline the management of cryptographic keys across various business applications. It automates key updates and distribution, handling the entire lifecycle of both symmetric and asymmetric keys. J-KMS enforces specific roles and responsibilities for key sets, reducing manual tasks and allowing staff to focus on policy decisions. It supports standard key formats and ensures compliance with standards like PCI-DSS and GDPR. Key functions include key generation, backup, restoration, distribution, import/export, audit logging, encryption using Key Encryption Keys (KEKs) or Zone Master Keys (ZMKs), and certification with X.509 or EMV certificates. Benefits of J-KMS encompass reduced human error through user and admin permissions, streamlined processes, cost reduction via automation, dual control with asynchronous workflows, tamper-evident records for compliance, and system-wide key control for any key type and format. -
36
east-tec InvisibleSecrets
East-Tec
east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy and safe sharing, you can create self-decrypting packages that only require a password to open, even if the recipient doesn’t have the software. Additional tools like a virtual keyboard help defend against keyloggers, making InvisibleSecrets a well-rounded solution for protecting your digital life.Starting Price: $29.95 one-time payment -
37
Ubiq
Ubiq Security
Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.Starting Price: $0.001 per encrypt -
38
Entro
Entro Security
Non-Human Identity & Secrets Security Platform. A pioneer in non-human identity management, Entro enables organizations to securely utilize non-human identities and secrets, overseeing their usage and automating their lifecycle from inception to rotation. Secrets-based cyber attacks are devastating and growing as more and more secrets are created by R&D teams and spread across various vaults and repositories with no real secret management, monitoring, or security oversight. Streamline and secure your non-human identity lifecycle management. With Entro, security teams can now oversee and protect Non-human identities with automated lifecycle management and seamless integration, ensuring comprehensive security & compliance through a unified interface. -
39
Skyflow
Skyflow
Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data. -
40
SecureDoc CloudVM
WinMagic
WinMagic’s SecureDoc CloudVM solution is the industry’s most comprehensive full disk encryption and intelligent encryption key management for your virtual machines. It protects your data in public, private and hybrid cloud environments. It ensures that your volume and full disk encryption keys are in exclusive control of your organization. With the widest support from virtualized servers to numerous public and private Clouds, SecureDoc CloudVM enables a unified encryption strategy across any end point, virtualized or cloud IaaS environment. By providing a single platform and pane of glass, SecureDoc CloudVM increases enterprise security, ensures encryption compliance, reduces complexity and removes silos of encryption within your organization. WinMagic’s SecureDoc will allow you the convenience of a common platform to manage key and encryption needs intelligently, meaning that you control all aspects of your data security. -
41
Yandex Pay
Yandex
Yandex Pay is a service for fast and secure payment for purchases. With the advent of Yandex Pay on your website, millions of Yandex users will be able to pay for your orders faster. When paying via Yandex Pay, you do not need to enter the details of the bank card saved in Yandex. And the simpler the buying process, the more orders and the higher the conversion, and this means profit. Yandex stores and transmits payment data in encrypted form. Yandex Pay button may look different. Find the option that will look good on your site. Well-known payment aggregators work with Yandex Pay. If you are their client and do not have Yandex Pay, they can connect it at your request. Yandex Pay is an information service that allows you to save and use bank card data. With Yandex Pay, you can pay for purchases on sites with a bank card without entering its details. A card linked to a Yandex account is suitable for this. You can link your card at any time, even during payment. -
42
Cyqur
Binarii Labs
You control where your passwords and seed phrases are secured via the Cyqur browser extension. Cyqur encrypts, fragments, and distributes your data wherever you want for unprecedented security. Although, it’s always you who owns and controls your data. By adding the proof of record from the blockchain, the security process is complete. Encrypted pieces are stored across multiple cloud providers so data is incomplete and useless if hacked. Multi-cloud data sovereignty, automated seed word protection, blockchain-based proof of record, customizable MFA, a referral program for credits, and direct personal customer support. Store up to 50 text based secrets (e.g., notes, PINs, secret phrases, banking credentials, MFA backup codes). Secrets are uniquely fragmented, encrypted, and stored across three separate cloud locations for enhanced security. Enhanced log-on authentication with customizable MFA options.Starting Price: €15 one-time payment -
43
IBM Cloud Hyper Protect Crypto Services is an as-a-service key management and encryption solution, which gives you full control over your encryption keys for data protection. Experience a worry-free approach to multi-cloud key management through the all-in-one as-a-service solution and benefit from automatic key backups and built-in high availability to secure business continuity and disaster recovery. Manage your keys seamlessly across multiple cloud environments create keys securely and bring your own key seamlessly to hyperscalers such as Microsoft Azure AWS and Google Cloud Platform to enhance the data security posture and gain key control. Encrypt integrated IBM Cloud Services and applications with KYOK. Retain complete control of your data encryption keys with technical assurance and provide runtime isolation with confidential computing. Protect your sensitive data with quantum-safe measures by using Hyper Protect Crypto Services' Dillithium.
-
44
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance. -
45
You can deploy a ready-to-use cluster in just a few minutes. DB settings are initially optimized for the cluster size you selected. If the load on your cluster increases, you can add new servers or increase their capacity in a matter of minutes. Redis stores data in key-value format, supported values include strings, arrays, dictionaries, sets, bitmasks, and other types. Redis runs in RAM and is therefore suitable for tasks that require a quick response or involve performing a large number of operations on a relatively small amount of data. Backups of database contents are GPG-encrypted. Data is secured in accordance with the requirements of local regulatory, GDPR, and ISO industry standards. Set a time limit for Yandex Managed Service for Redis to automatically delete data and optimize your data storage costs.
-
46
Ente Auth
Ente
Ente Auth is a free, open-source two-factor authentication app that helps users generate and manage time-based one-time passwords to secure logins for online accounts with an extra layer of verification beyond just a password, offering end-to-end encrypted backups so you never lose your codes and they remain private even to the service itself. It syncs codes across mobile, desktop, and web clients using fully encrypted channels, lets users import existing 2FA tokens by scanning QR codes or manual entry, and provides features like offline code generation, tagging and searching of codes, pinning favorites, icon identification, and quick “next code” display for faster logins. Backups are encrypted with audited cryptography, giving users peace of mind that only they can decrypt and access their 2FA secrets, and codes can be shared securely with teammates via encrypted links with optional expirations.Starting Price: Free -
47
Themis
Cossack Labs
Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.Starting Price: $0.01 -
48
Salesforce Shield
Salesforce
Salesforce Shield is a comprehensive data security and compliance solution designed to protect sensitive information across the Salesforce platform. It provides advanced tools to monitor user activity, encrypt data, track changes, and detect sensitive information in real time. With Event Monitoring, organizations gain granular visibility into user behavior, API activity, and system performance through detailed event logs. Platform Encryption allows businesses to encrypt sensitive data at rest while maintaining control over encryption keys and compliance requirements. Field Audit Trail extends data history tracking to strengthen integrity and support forensic-level compliance. Data Detect uses intelligent pattern matching to identify and classify sensitive information such as credit card numbers and personal identifiers. Together, these capabilities help organizations mitigate risk, meet regulatory standards, and securely deploy AI-powered solutions like Agentforce.Starting Price: $25 per month -
49
SAV7
SAV7
SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards. -
50
Onboardbase
Onboardbase
Onboardbase is the a secret management infrastructure platform that provides single source of shared truth for app secrets and usage. It helps dev teams securely share and work with environment-specific configs at every development stage, synced across infrastructure without compromising security - this means development teams can focus on building great apps rather than managing secrets and data. Secrets are dynamically kept up to date across your environments and infrastructure, with 50+ integrations and growing. Dev teams can monitor and audit how long, where and when your secrets are used and revoke usage anywhere with a click. Powerful always-on codebase scanning features prevent developers from accidentally leaking secrets to production, maintaining a robust security model.Starting Price: Free