Entropy Keycrypt

Entropy Keycrypt

Quantum Entropy
+
+

Related Products

  • Auth0
    991 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • 1Password
    16,393 Ratings
    Visit Website
  • Chainguard
    46 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • StrongDM
    96 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • Aikido Security
    127 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website

About

A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.

About

Protect your essential digital assets with Entropy, offering a seamless and secure transition to your trusted circle in unforeseen circumstances. User-Friendly Security Entropy enables you to securely partition important information into discrete shares, each of which reveals nothing about your secret without the others. Distribute these to a select group of trusted individuals, who can then store them offline for added security. Long-Term Resilience With its robust security features, including 256-bit encryption, Entropy is well-suited for durable, decentralized offline storage, safeguarding your data from both online and specific offline threats.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations searching for an automated directory and authorization platform

Audience

Legal Profession, Financial Sector, Manufacturing & Consumer Goods, Tech Industry, Healthcare, Investors, Cryptocurrency investors, succession planning

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$24.99
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 4.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberArk
Founded: 2013
United States
conjur.org

Company Information

Quantum Entropy
Founded: 2023
Australia
entropykey.com

Alternatives

HashiCorp Vault

HashiCorp Vault

HashiCorp

Alternatives

QSE

QSE

QSE Group
RadiantOne

RadiantOne

Radiant Logic
Aurora Drug Discovery

Aurora Drug Discovery

Aurora Fine Chemicals
BK Software

BK Software

Intrinsic ID
Bravura Safe

Bravura Safe

Bravura Security

Categories

Categories

Integrations

1Kosmos
Aquera
Arch Linux
Check Point IPS
Cyberwatch
DNSWatch
Docker
Hive Perform
Notus
PangaeAPI
Pentera
Puppet Enterprise
SCADAfence
Securonix Unified Defense SIEM
Sendmail
TCPWave
Tenable One
Terraform
ThreatAware
ThreatSync

Integrations

1Kosmos
Aquera
Arch Linux
Check Point IPS
Cyberwatch
DNSWatch
Docker
Hive Perform
Notus
PangaeAPI
Pentera
Puppet Enterprise
SCADAfence
Securonix Unified Defense SIEM
Sendmail
TCPWave
Tenable One
Terraform
ThreatAware
ThreatSync
Claim CyberArk Conjur and update features and information
Claim CyberArk Conjur and update features and information
Claim Entropy Keycrypt and update features and information
Claim Entropy Keycrypt and update features and information