|
81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more ![]()
View Details
|
84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
View Details
|
Description | CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets. Read more | Zilla Security stands out as the ultimate platform for unified identity and access security, compliance, and provisioning. Seamlessly integrating with over 1,000 applications and infrastructure components, it ensures comprehensive monitoring of identities and permissions. Its robotic automation enables rapid integration with any application, often within minutes. Zilla Security simplifies the user access review process by automating decisions, preparation, remediation, audit evidence, and reporting. This policy-driven approach ensures job-appropriate access while enhancing security and lowering costs. By automating identity and security operations, Zilla Security effectively addresses identity exposure and eliminates threats, offering a robust solution for modern enterprises. Read more |
Pricing Options |
|
|
SW Score & Breakdown |
81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
Total Features |
5 Features
|
7 Features
|
Common Features for All |
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Role Management
User Activity Monitoring
|
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Role Management
User Activity Monitoring
|
Organization Types Supported |
|
|
Platforms Supported |
|
|
Modes of Support |
|
|
API Support |
|
|
User Rating |
|
|
Rating Distribution |
|
|
Read All User Reviews | Read All User Reviews |
AI-Generated from the text of User Reviews
Pricing Options |
|
|
Pricing Plans
Monthly Plans
Annual Plans
|
Zilla Security Custom |
|
Not Available |
View Detailed Pricing
|
Screenshots | Not Available |
![]()
+ 3 More
|
Company Details | Located in: Newton, Massachusetts | Located in: Boston, MA - 02011 Founded in: 2020 |
Contact Details |
1-888-808-9005 |
Not available |
Social Media Handles |
|
|
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.