Browse Software
List Your Product
Loading...
Keycloak logo

Keycloak

  Add to Compare

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CyberArk Conjur logo
View Details

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

AWS IAM logo
View Details

Overview

Description CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets. Read more AWS IAM is an intuitive Identity and Access Management solution, allowing organizations monitor access to AWS based resources and APIs in a secure way. Enterprises can monitor users and groups or schedule specific access rights to various AWS resources using the IAM module within the software. Business houses get to define specific conditional terms like, time of the day and monitor employee’s access factors, such as whether they use SSL, their original IP address, or whether they have active authentication with an MFA device. AWS IAM can be utilized by organisations to identify and finetune their policies besides modifying controlled access to variable services. Enterprises can augment user credentials to protect their AWS environments, based on the AWS MFA security feature within the particular. The system prompts employees to demonstrate their physical possession of MFA-token hardwire or provide a valid code through an MFA-supported mobile device. AWS IAM is compatible with identity management solutions that support SAML2.0 besides the federation samples offered by AWS Console SSO. Read more
Pricing Options
  • Free Trial Not Available
  • Free Trial Not Available
  • Offers Custom plan.
SW Score & Breakdown

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    80%
  • Reviews
    71%
  • Momentum
    63%
  • Popularity
    69%

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    93%
  • Reviews
    75%
  • Momentum
    69%
  • Popularity
    74%
SaaSworthy Awards
Not Available
# 5 Fastest Growing

Features

Total Features
5 Features
9 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 2 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • SaaS/Web/Cloud
    Modes of Support
    • Online
    • Online
    API Support
    • Available
    • Available

    Reviews & Ratings

    User Rating
    4.7/5 19 user ratings
    4.6/5 133 user ratings
    Rating Distribution
    • Excellent

      73.7%
    • Very Good

      26.3%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    • Excellent

      69.9%
    • Very Good

      26.3%
    • Average

      0%
    • Poor

      3%
    • Terrible

      0.8%
    User Sentiments
      Not Available

      Granular Access Control, Extensive Integrations, Role-Based Access Control, Centralized User Management

      Complex Policy Management, Steep Learning Curve, Confusing User Interface, Limited Cross-Platform Compatibility

    Review Summary
    Not Available

    Users find AWS Identity and Access Management (IAM) easy to use and appreciate its fine-grained control over permissions and access. It is praised for its strong security features, including multi-factor authentication and role-based access control. Additionally, IAM's integration with other AWS services is a major advantage. However, some users have reported issues with the complexity of the platform and occasional difficulties in setting up and managing policies. Overall, AWS IAM is a powerful and secure tool for managing access and permissions, favored for its ease of use and integration with other AWS services.

      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Not Available
    • Free Trial Not Available
    • Offers Custom plan.
    Pricing Plans
    Monthly Plans Annual Plans

    AWS IAM Custom

      Not Available
    View Detailed Pricing

    Screenshots & Videos

    Screenshots Not Available prod Stage Editor
    + 1 More
    Videos Not Available Video Thumbnail

    Vendor information

    Company Details Located in: Newton, Massachusetts Located in: Seattle, Washington
    Contact Details

    1-888-808-9005

    https://www.conjur.org/

    Not available

    https://aws.amazon.com/iam/

    Social Media Handles

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed