Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log. | It is the only security software company focused on eliminating cyber threats using insider privileges to attack the heart of the enterprise. |
Secure Secret Storage: Arbitrary key/value secrets can be stored in Vault. Vault encrypts these secrets prior to writing them to persistent storage, so gaining access to the raw storage isn't enough to access your secrets. Vault can write to disk, Consul, and more.;Dynamic Secrets: Vault can generate secrets on-demand for some systems, such as AWS or SQL databases. For example, when an application needs to access an S3 bucket, it asks Vault for credentials, and Vault will generate an AWS keypair with valid permissions on demand. After creating these dynamic secrets, Vault will also automatically revoke them after the lease is up.;Data Encryption: Vault can encrypt and decrypt data without storing it. This allows security teams to define encryption parameters and developers to store encrypted data in a location such as SQL without having to design their own encryption methods.;Leasing and Renewal: All secrets in Vault have a lease associated with it. At the end of the lease, Vault will automatically revoke that secret. Clients are able to renew leases via built-in renew APIs.;Revocation: Vault has built-in support for secret revocation. Vault can revoke not only single secrets, but a tree of secrets, for example all secrets read by a specific user, or all secrets of a particular type. Revocation assists in key rolling as well as locking down systems in the case of an intrusion. | Email attachment protection;
Credential protection and management;
Session isolation and monitoring;
Threat detection and analytics;
End-to-end server protection;
Domain controller protection;
Activity monitoring;
In-progress Kerberos attack detection |
Statistics | |
GitHub Stars 33.4K | GitHub Stars - |
GitHub Forks 4.5K | GitHub Forks - |
Stacks 808 | Stacks 43 |
Followers 802 | Followers 72 |
Votes 71 | Votes 0 |
Pros & Cons | |
Pros
| No community feedback yet |
Integrations | |
| No integrations available | |

It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.

Add a powerful, simple and flexible 2FA verification view to your login flow, without making any DB changes and just 3 API calls.

Doppler’s developer-first security platform empowers teams to seamlessly manage, orchestrate, and govern secrets at scale.
It centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for IBM and non-IBM storage solutions using the OASIS Key Management Interoperability Protocol (KMIP).

A container native solution that strengthens the Trusted Delivery component of container security by integrating secret distribution directly into the container platform.

It is a self-managed server that secures access to your applications and APIs with OAuth 2.0 and OpenID Connect. It is OpenID Connect Certified and optimized for latency, high throughput, and low resource consumption.

Virgil consists of an open-source encryption library, which implements CMS and ECIES(including RSA schema), a Key Management API, and a cloud-based Key Management Service.

Stop pouring through MAN pages and outdated blog posts that don't take into account new requirements. With our add-on, you can go from install to confirmed installation in as little as twenty minutes: using nothing but your browser.

Clef is secure two-factor — built for consumers. Easy to use, integrate, and pay for.