Alternatives to AWS Service Catalog logo

Alternatives to AWS Service Catalog

AWS Config, AWS IAM, Teleport, HashiCorp Boundary, and SailPoint are the most popular alternatives and competitors to AWS Service Catalog.
16
42
+ 1
0

What is AWS Service Catalog and what are its top alternatives?

AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.
AWS Service Catalog is a tool in the Cloud Access Management category of a tech stack.

Top Alternatives to AWS Service Catalog

  • AWS Config
    AWS Config

    AWS Config is a fully managed service that provides you with an AWS resource inventory, configuration history, and configuration change notifications to enable security and governance. With AWS Config you can discover existing AWS resources, export a complete inventory of your AWS resources with all configuration details, and determine how a resource was configured at any point in time. These capabilities enable compliance auditing, security analysis, resource change tracking, and troubleshooting. ...

  • AWS IAM
    AWS IAM

    It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. ...

  • Teleport
    Teleport

    Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements. ...

  • HashiCorp Boundary
    HashiCorp Boundary

    Simple and secure remote access — to any system anywhere based on trusted identity. It enables practitioners and operators to securely access dynamic hosts and services with fine-grained authorization without requiring direct network access. ...

  • SailPoint
    SailPoint

    It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges. ...

  • BeyondTrust
    BeyondTrust

    It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems. ...

  • Thycotic Secret Server
    Thycotic Secret Server

    It is an enterprise-grade, privileged access management solution that is quickly deployable and easily managed. You can automatically discover and manage your privileged accounts through an intuitive interface, protecting against malicious activity, enterprise-wide. ...

  • Key Vault Access Policy
    Key Vault Access Policy

    It determines whether a given service principal, namely an application or user group, can perform different operations on Key Vault secrets, keys, and certificates. You can assign access policies using the Azure portal, the Azure CLI, or Azure PowerShell. ...

AWS Service Catalog alternatives & related posts

AWS Config logo

AWS Config

50
81
6
Config gives you a detailed inventory of your AWS resources and their current configuration, and continuously records configuration...
50
81
+ 1
6
PROS OF AWS CONFIG
  • 4
    Backed by Amazon
  • 2
    One stop solution
CONS OF AWS CONFIG
  • 1
    Not user friendly

related AWS Config posts

AWS IAM logo

AWS IAM

1.1K
757
26
Securely control access to AWS services and resources for your users
1.1K
757
+ 1
26
PROS OF AWS IAM
  • 23
    Centralized powerful permissions based access
  • 3
    Straightforward SSO integration
CONS OF AWS IAM
  • 1
    Cloud auth limited to resources, no apps or services
  • 1
    No equivalent for on-premise networks, must adapt to AD

related AWS IAM posts

Teleport logo

Teleport

22
38
0
Modern Privileged Access Management
22
38
+ 1
0
PROS OF TELEPORT
    Be the first to leave a pro
    CONS OF TELEPORT
      Be the first to leave a con

      related Teleport posts

      HashiCorp Boundary logo

      HashiCorp Boundary

      18
      31
      0
      Identity-based access management for dynamic infrastructure
      18
      31
      + 1
      0
      PROS OF HASHICORP BOUNDARY
        Be the first to leave a pro
        CONS OF HASHICORP BOUNDARY
          Be the first to leave a con

          related HashiCorp Boundary posts

          SailPoint logo

          SailPoint

          11
          17
          0
          Simplify access and accelerate business, starting with your users
          11
          17
          + 1
          0
          PROS OF SAILPOINT
            Be the first to leave a pro
            CONS OF SAILPOINT
              Be the first to leave a con

              related SailPoint posts

              BeyondTrust logo

              BeyondTrust

              8
              15
              0
              Privileged access management solutions
              8
              15
              + 1
              0
              PROS OF BEYONDTRUST
                Be the first to leave a pro
                CONS OF BEYONDTRUST
                  Be the first to leave a con

                  related BeyondTrust posts

                  Thycotic Secret Server logo

                  Thycotic Secret Server

                  2
                  1
                  0
                  Easy-to-use, full-featured privileged access management
                  2
                  1
                  + 1
                  0
                  PROS OF THYCOTIC SECRET SERVER
                    Be the first to leave a pro
                    CONS OF THYCOTIC SECRET SERVER
                      Be the first to leave a con

                      related Thycotic Secret Server posts

                      Key Vault Access Policy logo

                      Key Vault Access Policy

                      2
                      1
                      0
                      It determines whether a given service can perform different operations on Key Vault secrets, keys, and certificates
                      2
                      1
                      + 1
                      0
                      PROS OF KEY VAULT ACCESS POLICY
                        Be the first to leave a pro
                        CONS OF KEY VAULT ACCESS POLICY
                          Be the first to leave a con

                          related Key Vault Access Policy posts