+
+

Related Products

  • Passwork
    99 Ratings
    Visit Website
  • Auth0
    1,037 Ratings
    Visit Website
  • Keeper Security
    1,764 Ratings
    Visit Website
  • Frontegg
    383 Ratings
    Visit Website
  • 1Password
    16,707 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • ThreatLocker
    684 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Chainguard
    53 Ratings
    Visit Website
  • Admin By Request Endpoint Privilege Management
    84 Ratings
    Visit Website

About

A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.

About

Enable app-to-app communications and app-to-database access without hardcoding credentials. Secure access to tools for software and infrastructure deployment, testing, orchestration, and configuration. Centrally manage, control, and audit secrets for automated processes that operate without human oversight. Deploy rapidly with cloud-native SaaS architecture and elastic scalability that static, IP-based PAM solutions can’t provide. The standard definition of PAM isn’t sufficient for the growing risk of cyberattacks. We believe PAM must address the exploding number of identities and today’s IT complexities.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations searching for an automated directory and authorization platform

Audience

Companies looking for a powerful Privileged Access Management platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberArk
Founded: 2013
United States
conjur.org

Company Information

Delinea
Founded: 2022
United States
delinea.com/products/devops-secrets-management-vault

Alternatives

HashiCorp Vault

HashiCorp Vault

HashiCorp

Alternatives

RadiantOne

RadiantOne

Radiant Logic
Sonrai Security

Sonrai Security

Sonraí Security

Categories

Categories

Integrations

AWS Marketplace
Amazon Web Services (AWS)
Brainwave GRC
Check Point IPS
Check Point Infinity
Cyberwatch
DatAnswers
Docker
Entrust Certificate Hub
Entrust Identity Enterprise
InsightCloudSec
Jenkins
Notus
Qualys WAS
RadiantOne
SQLXPress
Securonix Unified Defense SIEM
Sendmail
Tenable One

Integrations

AWS Marketplace
Amazon Web Services (AWS)
Brainwave GRC
Check Point IPS
Check Point Infinity
Cyberwatch
DatAnswers
Docker
Entrust Certificate Hub
Entrust Identity Enterprise
InsightCloudSec
Jenkins
Notus
Qualys WAS
RadiantOne
SQLXPress
Securonix Unified Defense SIEM
Sendmail
Tenable One
Claim CyberArk Conjur and update features and information
Claim CyberArk Conjur and update features and information
Claim Delinea DevOps Secret Vault and update features and information
Claim Delinea DevOps Secret Vault and update features and information