# Best Secrets Management Tools

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Secrets management tools help companies securely store, transmit, and manage sensitive digital authentication credentials such as passwords, SSH keys, API keys, database passwords, certificates like TLS/SSL certificates or private certificates, tokens, encryption keys, privileged credentials, and other secrets.

Companies use these tools to manage their secrets across their IT ecosystem centrally. These tools reduce the risks associated with poor and manual secrets management, such as hardcoding secrets into scripts, using default passwords, sharing passwords, and not rotating credentials. Secrets management tools replace fragmented and manual secrets management and provide central visibility, oversight, and management of a company’s credentials, keys, and other secrets across departments. Most commonly, these tools are used by software developers, security professionals, and IT operations teams (DevOps or DevSecOps).

Secrets management tools are similar to but more robust than [encryption key management software](https://www.g2.com/categories/encryption-key-management), which focuses on the storage, use, and rotation of encryption keys. Similarly, there is an overlap between secrets management and [privileged access management (PAM) software](https://www.g2.com/categories/privileged-access-management-pam). While security-focused PAM solutions offer secrets management, they also offer more robust security functions for enforcing least privilege policies with access controls, monitoring and recording privileged sessions, and alerting suspicious activity. Some secrets management solutions are built into platforms or cloud providers directly. In contrast, other solutions augment that functionality by offering a universal and centralized approach to secrets management, regardless of platform, using integrations.

To qualify for the Secrets Management category, a product must:

- Centrally manage keys and other secrets
- Securely store secrets with encryption and tokenization
- Automate pushing secrets to applications and infrastructure
- Create audit trail of secrets use and lifecycle





## Category Overview

**Total Products under this Category:** 35


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 3,300+ Authentic Reviews
- 35+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Secrets Management Tools At A Glance

- **Leader:** [1Password](https://www.g2.com/products/1password/reviews)
- **Highest Performer:** [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
- **Easiest to Use:** [1Password](https://www.g2.com/products/1password/reviews)
- **Top Trending:** [1Password](https://www.g2.com/products/1password/reviews)
- **Best Free Software:** [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)


---

**Sponsored**

### BeyondTrust Privileged Remote Access

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and OT systems. Each connection is brokered by the BeyondTrust platform, ensuring a zero-trust approach that grants the least amount of privilege necessary. By providing least-privileged access on demand, you can streamline operations, while reducing your attack surface and administrative overhead. Get a Free Trial: https://www.beyondtrust.com/privileged-remote-access-trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Privileged Remote Access: https://www.beyondtrust.com/products/privileged-remote-access



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2877&amp;secure%5Bdisplayable_resource_id%5D=1252&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1252&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=15211&amp;secure%5Bresource_id%5D=2877&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fsecrets-management-tools%2Fsmall-business&amp;secure%5Btoken%5D=3107d224a93d1365ce5ec6a4090e7bba7cfe8e7ada8f622bf0b08d6adfa00476&amp;secure%5Burl%5D=https%3A%2F%2Fwww.beyondtrust.com%2Fproducts%2Fprivileged-remote-access%3Futm_source%3DG2%26utm_medium%3Ddisplay%26utm_campaign%3DPRA%26utm_content%3DPRA&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [1Password](https://www.g2.com/products/1password/reviews)
  The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,745


**Seller Details:**

- **Seller:** [1Password](https://www.g2.com/sellers/1password)
- **Company Website:** https://1password.com/
- **Year Founded:** 2005
- **HQ Location:** Ontario
- **Twitter:** @1Password (139,662 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1password/ (2,911 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Small-Business, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (333 reviews)
- Security (271 reviews)
- Password Management (182 reviews)
- Intuitive (144 reviews)
- Easy Access (134 reviews)

**Cons:**

- Password Management (95 reviews)
- Expensive (91 reviews)
- Login Issues (69 reviews)
- Autofill Issues (64 reviews)
- Cost (60 reviews)

### 2. [Azure Key Vault](https://www.g2.com/products/azure-key-vault/reviews)
  Azure Key Vault is a cloud service designed to securely store and manage cryptographic keys, secrets, and certificates used by applications and services. It enables organizations to safeguard sensitive information such as API keys, passwords, and connection strings, ensuring that these secrets are protected and accessible only to authorized users and applications. By centralizing the management of keys and secrets, Azure Key Vault helps maintain compliance with security standards and simplifies the administration of cryptographic materials. Key Features and Functionality: - Secrets Management: Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets. - Key Management: Easily create and control the encryption keys used to encrypt your data. - Certificate Management: Provision, manage, and deploy public and private Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates for use with Azure and your internal connected resources. - Access Control: Integrates with Azure Active Directory (Azure AD) to provide fine-grained access control through role-based access control (RBAC) and access policies. - Monitoring and Logging: Monitor and audit key usage with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection. - Integration with Azure Services: Seamlessly integrates with other Azure services, such as Azure Storage, Azure SQL Database, and Azure App Service, allowing applications to retrieve and use secrets, certificates, and keys securely without needing to store sensitive information in application code or configuration files. Primary Value and Problem Solved: Azure Key Vault addresses the critical need for secure and efficient management of cryptographic keys and secrets in cloud environments. By centralizing the storage and access control of sensitive information, it reduces the risk of accidental leaks and unauthorized access. The service simplifies the process of key and secret management, allowing developers to focus on application development without the burden of implementing custom security solutions. Additionally, Azure Key Vault enhances compliance with security standards and regulations by providing robust access controls, monitoring capabilities, and integration with Azure&#39;s security ecosystem.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 46


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,844 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Accounting
  - **Company Size:** 51% Enterprise, 25% Small-Business


### 3. [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
  Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper&#39;s intuitive cybersecurity platform is trusted by Fortune 100 companies to protect every user, on every device, in every location. Our patented zero-trust and zero-knowledge privileged access management solution unifies enterprise password, secrets and connections management with zero-trust network access and endpoint privilege mangement. By combining these critical identity and access management components into a single cloud-based solution, Keeper delivers unparalleled visibility, security and control while ensuring compliance and audit requirements are met. Learn how Keeper can defend your organization against today’s cyber threats at KeeperSecurity.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,184


**Seller Details:**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Company Website:** https://www.keepersecurity.com/
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,946 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 42% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (168 reviews)
- Security (128 reviews)
- Secure Sharing (88 reviews)
- Password Management (87 reviews)
- Features (74 reviews)

**Cons:**

- Password Management (71 reviews)
- Autofill Issues (49 reviews)
- Login Issues (39 reviews)
- Password Issues (34 reviews)
- Learning Curve (33 reviews)

### 4. [BeyondTrust Password Safe](https://www.g2.com/products/beyondtrust-password-safe/reviews)
  BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and secrets. Password Safe drives automated credential and secrets management, real-time session management &amp; monitoring, and advanced auditing &amp; forensics capabilities – all while enabling zero trust. Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Password Safe: https://www.beyondtrust.com/products/password-safe


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 45


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Banking, Information Technology and Services
  - **Company Size:** 54% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (11 reviews)
- Security (10 reviews)
- Auditing (9 reviews)
- Password Management (9 reviews)
- Secure Access (9 reviews)

**Cons:**

- Complex Setup (7 reviews)
- Expensive (3 reviews)
- Poor Reporting (3 reviews)
- Setup Difficulty (3 reviews)
- Steep Learning Curve (3 reviews)

### 5. [IBM Vault (formerly HashiCorp Vault)](https://www.g2.com/products/ibm-vault-formerly-hashicorp-vault/reviews)
  IBM Vault (formerly HashiCorp Vault) tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault&#39;s main use cases include: - Secrets Management - Identity Brokering - Data Encryption


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 46


**Seller Details:**

- **Seller:** [HashiCorp](https://www.g2.com/sellers/hashicorp)
- **Company Website:** https://www.hashicorp.com/
- **Year Founded:** 2012
- **HQ Location:** San Francisco, CA
- **Twitter:** @hashicorp (102,195 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2830763/ (2,193 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 40% Mid-Market, 36% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Integrations (1 reviews)
- Easy Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Expensive (1 reviews)

### 6. [Doppler secrets management platform](https://www.g2.com/products/doppler-secrets-management-platform/reviews)
  Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significant risks, inefficiencies, and operational headaches. Doppler tackles these issues by consolidating secret management into a single, secure platform, ensuring reliability and consistency across teams and environments. Doppler’s mission reflects its core value: replacing disorganized, high-risk workflows with a unified, reliable system. With Doppler, teams can better manage their secrets while fostering security and operational stability. Managing secrets across diverse systems can often feel overwhelming. Doppler eliminates this complexity by organizing and securing sensitive data in one place. Its unified interface allows teams to maintain control over their secrets, enforce security best practices, and reduce the likelihood of misconfigurations or breaches. Doppler provides a structured and dependable solution to secrets management by addressing key challenges like: - Manual secret rotations - Synchronization issues - Compliance tracking Integration with popular tools and workflows is central to Doppler’s design. This ensures compatibility without disrupting established processes. This reduces operational bottlenecks, helping teams maintain productivity and focus on deploying critical applications. Connect with tools like: - Kubernetes - Terraform - CI/CD pipelines Its built-in logging and audit trails reduce the burden of manual compliance tasks, allowing teams to focus on strategic initiatives rather than administrative overhead. The platform also enhances visibility by providing insights into secret usage and access, ensuring that no detail is overlooked. For organizations concerned with compliance, Doppler simplifies the process of meeting industry standards such as: - SOC 2 - HIPAA - GDPR - ISO Doppler delivers a dependable way to centralize and safeguard secrets, reducing the risk of operational disruptions while maintaining compliance. Whether managing daily operations or scaling infrastructure, Doppler ensures your organization is prepared to handle the challenges of modern development environments. By bringing security, organization, and clarity to secret management, Doppler empowers teams to focus on what truly matters—driving innovation and delivering impactful results.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 64


**Seller Details:**

- **Seller:** [Doppler](https://www.g2.com/sellers/doppler)
- **Company Website:** https://www.doppler.com/
- **Year Founded:** 2018
- **HQ Location:** San Francisco, California
- **Twitter:** @doppler (1,573 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/dopplerhq/ (43 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 77% Small-Business, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Easy Integrations (4 reviews)
- Integrations (4 reviews)
- Tools (3 reviews)
- Security (2 reviews)

**Cons:**

- Complex Setup (3 reviews)
- Expensive (2 reviews)
- Limited OS Compatibility (1 reviews)
- Setup Difficulty (1 reviews)

### 7. [Akeyless Identity Security Platform](https://www.g2.com/products/akeyless-identity-security-platform/reviews)
  Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers AI-powered identity intelligence to surface risky access and strengthen oversight.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 86


**Seller Details:**

- **Seller:** [Akeyless](https://www.g2.com/sellers/akeyless)
- **Company Website:** https://www.akeyless.io
- **Year Founded:** 2018
- **HQ Location:** Ramat Gan, Israel
- **Twitter:** @akeylessio (285 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/akeyless/ (103 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 51% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (12 reviews)
- Security (10 reviews)
- Customer Support (9 reviews)
- Easy Integrations (4 reviews)
- Implementation Ease (4 reviews)

**Cons:**

- Poor Documentation (3 reviews)
- Poor UI (3 reviews)
- Complex Setup (2 reviews)
- Complex Usage (2 reviews)
- Dependency Issues (2 reviews)

### 8. [Delinea Secret Server](https://www.g2.com/products/delinea-secret-server/reviews)
  Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winning enterprise-grade software gives security and IT leaders the agility to vault and manage all types of privileges, protecting administrator, service, application, and root accounts from cyber criminals. Secret Server empowers organizations of any size to improve security posture, minimize complexity, and increase security policy adoption more seamlessly than any other PAM solution. Secret Server is the end-to-end PAM solution that ensures secure privileged account credentials and is available on-premise or in the cloud on the Delinea Platform. This robust and scalable PAM solution is recognized as easy to use and deploy, offering the fastest time to value of any PAM solution.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 42


**Seller Details:**

- **Seller:** [Delinea](https://www.g2.com/sellers/delinea)
- **Year Founded:** 2004
- **HQ Location:** San Francisco
- **Twitter:** @DelineaInc (885 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/delinea/ (1,232 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 60% Mid-Market, 33% Enterprise


#### Pros & Cons

**Pros:**

- Password Management (1 reviews)
- Security (1 reviews)

**Cons:**

- Complex Usage (1 reviews)
- Setup Difficulty (1 reviews)

### 9. [Keeper Secrets Manager](https://www.g2.com/products/keeper-secrets-manager/reviews)
  Privileged credentials are some of the highest-value targets for cybercriminals. Keeper Secrets Manager is a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets such as API keys, database passwords, access keys, certificates and any type of confidential data. Secure your environment and eliminate secrets sprawl by removing hard-coded credentials from your source code, config files and CI/CD systems. - Manage access rights and permissions with role-based access controls - Integrate secrets into your infrastructure, containers and build systems - Consolidate your secrets in a unified platform with auditability - Automate the rotation of access keys, passwords and certificates - Expand the capabilities of your Keeper EPM platform for enterprise-wide coverage - Team members can manage an unlimited number of secrets, applications and environments Seamlessly Integrates with Your IT Stack Keeper Secrets Manager integrates with all popular CI/CD systems, SDKs for all major programming languages and supports any type of machine to protect your infrastructure.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 8


**Seller Details:**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,946 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 75% Small-Business, 13% Enterprise


### 10. [Knox](https://www.g2.com/products/knox/reviews)
  Knox is a SaaS (Secrets as a Service) that helps you manage your keys, secrets, and configurations. Start in minutes and close the widest security breach.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 7


**Seller Details:**

- **Seller:** [Knox](https://www.g2.com/sellers/knox)
- **HQ Location:** Paris, France
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 38% Enterprise, 38% Small-Business


### 11. [CyberArk Conjur](https://www.g2.com/products/cyberark-conjur/reviews)
  For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 14


**Seller Details:**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,740 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (5,022 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 59% Enterprise, 29% Mid-Market


### 12. [Google Cloud Key Management Service](https://www.g2.com/products/google-cloud-key-management-service/reviews)
  Manage encryption keys on Google Cloud Platform


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 16


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,885,216 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Company Size:** 53% Enterprise, 29% Small-Business


#### Pros & Cons

**Pros:**

- Cloud Storage (1 reviews)
- Easy Access (1 reviews)

**Cons:**

- Slow Performance (1 reviews)

### 13. [Infisical](https://www.g2.com/products/infisical/reviews)
  Infisical is an open secret management platform that helps companies manage secrets across their engineers and infrastructure. In addition, Infisical provides automatic secret scanning capabilities and secret leak prevention.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 4


**Seller Details:**

- **Seller:** [Infisical](https://www.g2.com/sellers/infisical)
- **Year Founded:** 2022
- **HQ Location:** San Francisco, US
- **LinkedIn® Page:** https://www.linkedin.com/company/infisical (19 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 75% Small-Business, 25% Mid-Market


### 14. [Pulumi ESC](https://www.g2.com/products/pulumi-inc-pulumi-esc/reviews)
  Pulumi ESC is a centralized secrets management &amp; orchestration service that makes it easy to tame secrets sprawl and configuration complexity securely across all your cloud infrastructure and applications. You can pull and sync secrets with any secrets store – including HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, 1Password, and more – and consume secrets in any application, tool, or CI/CD platform. Pulumi ESC makes adopting dynamic, short-lived secrets on demand as a best practice easy. It leverages the same Pulumi Cloud identity, RBAC, Teams, SAML/SCIM, OIDC, and scoped access tokens used for Pulumi IaC to ensure secrets management complies with enterprise security policies. Every time secrets or configuration values are accessed or changed with Pulumi ESC, the action is fully logged for auditing. So you can trust (and prove) your secrets are secure. Pulumi ESC makes it easy to eliminate the need for developers to copy and paste secrets and store them in plaintext on their computers. Developers can easily access secrets via CLI, API, Kubernetes operator, the Pulumi Cloud UI, and in-code with Typescript/Javascript, Python, and Go SDKs.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 3


**Seller Details:**

- **Seller:** [Pulumi](https://www.g2.com/sellers/pulumi)
- **Year Founded:** 2017
- **HQ Location:** Seattle, WA
- **Twitter:** @PulumiCorp (16,928 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/pulumi/ (132 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 15. [AWS Secrets Manager](https://www.g2.com/products/aws-secrets-manager/reviews)
  AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 17


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,223,984 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Top Industries:** Computer Software
  - **Company Size:** 56% Enterprise, 28% Mid-Market


### 16. [Confidant](https://www.g2.com/products/confidant/reviews)
  Confidant is an open source secret management service that provides user-friendly storage and access to secrets in a secure way.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Lyft](https://www.g2.com/sellers/lyft)
- **Year Founded:** 2012
- **HQ Location:** San Francisco, US
- **Twitter:** @lyft (237,479 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2620735/ (27,811 employees on LinkedIn®)
- **Ownership:** NASDAQ: LYFT

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 17. [Cyqur](https://www.g2.com/products/cyqur/reviews)
  PATENTED PASSWORD PROTECTION Cyqur is an easy-to-install browser extension. The simple, yet powerful encryption and decryption web extension facilitates the storage and transmission of private data (passwords, seed phrases, etc.). The patented solution helps users achieve unparalleled peace of mind for their digital profiles.   Our solution does not store your data on your behalf nor through third-party servers, or any other centralised means. Instead, it encrypts your data and then fragments that encrypted data across a multi cloud storage solution chosen and controlled by you. Because of the fragmentation and decentralization of data storage in this manner, it is virtually impossible for all cloud storage locations to be compromised at the same time. How Cyqur helps users achieve peace of mind  🟣 Secure storage &amp; Data Sovereignty: User access credentials are duplicated, fragmented, encrypted, and scattered across multiple cloud storage locations that the user alone 100% owns and controls, all the while ensuring your data fragments remain encrypted at rest. Cyqur does not have access to any of your data and it doesn’t scrape or share user browsing data.   🟣 Proprietary approach: Safeguards user data by using an immutable, automated, unique, independent, public blockchain proof of record for every access credential secured. User digital profile succession planning is ensured through Custodian of Last Resort.  🟣 Breach protection: In case of a breach, hackers only access incomplete and useless data, while you retain uninterrupted complete access to your user credentials that remain protected and safe.  🟣 Crypto wallet protection: Specifically designed to provide next-level peace of mind by securing all access credentials to your valuable wallets, including your previous seed words.  🟣 Uninterrupted access and credential sharing: Users retain complete and uninterrupted access to their most important data, even offline.   CERTIFICATIONS UK &amp; US Patented 2023 ISO 27001 SOC2 Your data Your Rules


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Binarii Labs](https://www.g2.com/sellers/binarii-labs)
- **Year Founded:** 2021
- **HQ Location:** Dublin 4, IE
- **LinkedIn® Page:** https://www.linkedin.com/company/binariilabs/ (16 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 18. [EnvKey](https://www.g2.com/products/envkey/reviews)
  EnvKey is a software that prevent insecure sharing and config sprawl. Works as an end-to-end encrypted configuration and secrets management.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Envkey](https://www.g2.com/sellers/envkey)
- **HQ Location:** N/A
- **Twitter:** @EnvkeyConfig (474 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise


### 19. [Google Secret Manager](https://www.g2.com/products/google-secret-manager/reviews)
  Secret Manager Store API keys, passwords, certificates, and other sensitive data. New customers get $300 in free credits to spend on Secret Manager. All customers get six secret versions for analyzing and storing sensitive data.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,885,216 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


### 20. [Vaultiqo](https://www.g2.com/products/vaultiqo/reviews)
  Secure password and secrets management for Google Workspace™ teams. Managing shared passwords, API keys, and sensitive credentials across teams is difficult and insecure. Vaultiqo helps Google Workspace™ teams securely store, share, and control access to passwords and secrets directly within their Workspace environment.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Vaultiqo](https://www.g2.com/sellers/vaultiqo)
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/vaultiqo/ (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 21. [Zero](https://www.g2.com/products/secrets-manager-for-the-era-of-api-economy-zero/reviews)
  Zero is a modern secrets manager built with usability at its core. Reliable and secure, it saves time and effort.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [Zero](https://www.g2.com/sellers/zero-9b5948da-4910-4fa0-a4f1-2fb01627d8ae)
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 22. [BeyondTrust DevOps Secrets Safe](https://www.g2.com/products/beyondtrust-devops-secrets-safe/reviews)
  DevOps Secrets Safe enables enterprise teams to secure and manage credentials and other secrets used in their continuous integration and continuous delivery (CI/CD) toolchain, applications, and other automated processes. The solution helps organizations to reduce the security and compliance risks associated with secrets sprawl, while improving agility.




**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 23. [Bitwarden Secrets Manager](https://www.g2.com/products/bitwarden-secrets-manager/reviews)
  Bitwarden Secrets Manager is an end-to-end encrypted secrets management solution that empowers development teams to easily store, manage, automate, and share secrets at scale and facilitate programmatic machine-to-machine interactions.




**Seller Details:**

- **Seller:** [Bitwarden](https://www.g2.com/sellers/bitwarden)
- **Year Founded:** 2015
- **HQ Location:** Santa Barbara, CA
- **Twitter:** @Bitwarden (128,106 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/24776937/ (254 employees on LinkedIn®)



### 24. [Cremit](https://www.g2.com/products/cremit/reviews)
  Take control of your sprawling non-human identity landscape with a unified platform that automates detection, ensures continuous monitoring, and enables proactive risk mitigation across all your environments.




**Seller Details:**

- **Seller:** [Cremit](https://www.g2.com/sellers/cremit)
- **Year Founded:** 2023
- **HQ Location:** Seoul, KR
- **LinkedIn® Page:** https://www.linkedin.com/company/cremit (5 employees on LinkedIn®)



### 25. [Delinea DevOps Secrets Vault](https://www.g2.com/products/delinea-devops-secrets-vault/reviews)
  Delinea’s DevOps Secrets Vault is a high-velocity vault capable of high-speed secrets creation, archiving, and retrieval. This cloud-based solution is platform agnostic and designed to replace hardcoded credentials in apps for access to other apps, databases, and services, DevOps tools, and robotic process automation. This vault ensures IT and DevOps teams the speed and agility needed to stay competitive without sacrificing security. Dynamic secrets management delivered as a service empowers organizations to adopt modern DevOps and RPA principles easily and securely. DevOps Secrets Vault centralizes management, enforces access, and provides automated logging trails. Now companies can minimize privilege account sprawl and harden their attack surface to lower the risk of attack without sacrificing productivity.




**Seller Details:**

- **Seller:** [Delinea](https://www.g2.com/sellers/delinea)
- **Year Founded:** 2004
- **HQ Location:** San Francisco
- **Twitter:** @DelineaInc (885 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/delinea/ (1,232 employees on LinkedIn®)





## Parent Category

[Data Security Software](https://www.g2.com/categories/data-security)



## Related Categories

- [Privileged Access Management (PAM) Software](https://www.g2.com/categories/privileged-access-management-pam)
- [Encryption Key Management Software](https://www.g2.com/categories/encryption-key-management)




