Introducing G2.ai, the future of software buying.Try now

Compare 1Password and CentOS

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
1Password
1Password
Star Rating
(1,553)4.6 out of 5
Market Segments
Small-Business (57.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Custom Quote
Free Trial is available
Browse all 3 pricing plans
CentOS
CentOS
Star Rating
(405)4.4 out of 5
Market Segments
Mid-Market (38.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about CentOS

1Password vs CentOS

When assessing the two solutions, reviewers found 1Password easier to use, set up, and administer. Reviewers also preferred doing business with 1Password overall.

  • Reviewers felt that 1Password meets the needs of their business better than CentOS.
  • When comparing quality of ongoing product support, reviewers felt that 1Password is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of 1Password over CentOS.
Pricing
Entry-Level Pricing
1Password
Enterprise
Custom Quote
Browse all 3 pricing plans
CentOS
No pricing available
Free Trial
1Password
Free Trial is available
CentOS
No trial information available
Ratings
Meets Requirements
9.3
1,296
9.1
327
Ease of Use
9.0
1,308
8.5
328
Ease of Setup
8.9
599
8.5
205
Ease of Admin
9.1
447
8.5
197
Quality of Support
9.0
917
8.1
272
Has the product been a good partner in doing business?
9.4
401
8.7
154
Product Direction (% positive)
8.8
1,239
8.3
308
Features by Category
8.4
58
Not enough data
Authentication Options
8.7
57
Not enough data
8.8
57
Not enough data
8.7
56
Not enough data
8.7
53
Not enough data
8.0
54
Not enough data
7.7
53
Not enough data
Access Control Types
8.2
50
Not enough data
8.7
49
Not enough data
8.8
49
Not enough data
8.0
47
Not enough data
8.5
50
Not enough data
Administration
8.5
47
Not enough data
8.8
47
Not enough data
8.5
47
Not enough data
8.6
48
Not enough data
8.8
48
Not enough data
Platform
8.4
48
Not enough data
8.2
45
Not enough data
8.4
50
Not enough data
8.3
44
Not enough data
8.1
45
Not enough data
8.2
48
Not enough data
8.2
43
Not enough data
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
8.7
6
Not enough data
User on/off Boarding
8.7
5
Not enough data
Not enough data
Not enough data
8.7
5
Not enough data
8.3
5
Not enough data
8.0
5
Not enough data
8.3
5
Not enough data
User Maintenance
8.6
6
Not enough data
8.3
6
Not enough data
9.4
6
Not enough data
Governance
8.6
6
Not enough data
9.4
6
Not enough data
Administration
9.2
6
Not enough data
9.7
6
Not enough data
8.9
6
Not enough data
8.3
6
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.3
60
Not enough data
Authentication type
7.3
49
Not enough data
6.6
49
Not enough data
8.1
50
Not enough data
8.4
48
Not enough data
8.8
49
Not enough data
8.9
51
Not enough data
8.6
52
Not enough data
8.3
49
Not enough data
Functionality
8.9
53
Not enough data
8.7
50
Not enough data
Implementation
9.0
53
Not enough data
8.0
44
Not enough data
7.9
43
Not enough data
Biometric AuthenticationHide 7 FeaturesShow 7 Features
9.1
23
Not enough data
Integration
9.1
21
Not enough data
9.0
20
Not enough data
8.9
21
Not enough data
9.2
20
Not enough data
Administration
9.5
20
Not enough data
8.9
21
Not enough data
9.3
21
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
9.0
6
Not enough data
Administration
9.2
6
Not enough data
8.9
6
Not enough data
8.9
6
Not enough data
8.9
6
Not enough data
Password Policy EnforcementHide 12 FeaturesShow 12 Features
8.7
21
Not enough data
Functionality
8.4
19
Not enough data
8.5
18
Not enough data
8.1
19
Not enough data
8.7
18
Not enough data
Administration
9.5
20
Not enough data
8.9
19
Not enough data
8.8
19
Not enough data
9.0
18
Not enough data
8.5
18
Not enough data
Compliance
8.7
17
Not enough data
8.4
18
Not enough data
8.7
18
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.7
42
Not enough data
Functionality
8.5
32
Not enough data
8.6
32
Not enough data
9.0
36
Not enough data
8.5
37
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
9.1
27
Not enough data
Functionality
9.2
24
Not enough data
9.7
25
Not enough data
9.2
24
Not enough data
9.4
24
Not enough data
9.4
24
Not enough data
9.2
24
Not enough data
Type
9.1
22
Not enough data
9.3
23
Not enough data
Reporting
9.3
23
Not enough data
9.4
22
Not enough data
8.8
11
Not enough data
9.1
11
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
9.1
11
Not enough data
Administration & Governance - Identity and Access Management (IAM)
8.6
11
Not enough data
9.2
11
Not enough data
Generative AI - Identity and Access Management (IAM)
7.9
11
Not enough data
8.8
11
Not enough data
8.3
11
Not enough data
8.9
9
Not enough data
Functionality
9.1
9
Not enough data
9.4
9
Not enough data
9.1
9
Not enough data
8.1
7
Not enough data
9.2
8
Not enough data
8.1
8
Not enough data
9.0
8
Not enough data
8.8
8
Not enough data
Secrets Management ToolsHide 3 FeaturesShow 3 Features
8.9
56
Not enough data
Functionality
8.7
49
Not enough data
8.9
49
Not enough data
9.2
49
Not enough data
Not enough data
8.4
13
Memory Management - Operating System
Not enough data
8.7
13
Device Management - Operating System
Not enough data
8.3
12
Backup and Recovery - Operating System
Not enough data
8.2
12
Error Detection - Operating System
Not enough data
8.5
12
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
1,011
Not enough data
Usability & Access
9.2
973
Not enough data
9.0
946
Not enough data
8.8
866
Not enough data
9.3
900
Not enough data
8.9
737
Not enough data
Security Measures
9.4
944
Not enough data
9.2
759
Not enough data
9.0
728
Not enough data
Storage
8.9
693
Not enough data
8.5
618
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
1Password
1Password
Small-Business(50 or fewer emp.)
57.3%
Mid-Market(51-1000 emp.)
31.4%
Enterprise(> 1000 emp.)
11.3%
CentOS
CentOS
Small-Business(50 or fewer emp.)
31.3%
Mid-Market(51-1000 emp.)
38.3%
Enterprise(> 1000 emp.)
30.3%
Reviewers' Industry
1Password
1Password
Computer Software
18.9%
Information Technology and Services
16.7%
Marketing and Advertising
6.3%
Internet
5.7%
Financial Services
3.8%
Other
48.6%
CentOS
CentOS
Information Technology and Services
30.6%
Computer Software
15.5%
Computer & Network Security
6.0%
Telecommunications
3.9%
Internet
3.4%
Other
40.7%
Alternatives
1Password
1Password Alternatives
LastPass
LastPass
Add LastPass
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
NordPass Business
NordPass Business
Add NordPass Business
OneLogin
OneLogin
Add OneLogin
CentOS
CentOS Alternatives
Ubuntu
Ubuntu
Add Ubuntu
Red Hat Enterprise Linux
Red Hat Enterprise Linux
Add Red Hat Enterprise Linux
Windows 7
Windows 7
Add Windows 7
macOS Sierra
macOS Sierra
Add macOS Sierra
Discussions
1Password
1Password Discussions
What is 1password?
3 Comments
CB
It's an all-in-one password and secure information management app. You can use it to store and easily recall your website logins, email passwords, credit...Read more
Can you use 1password for free?
3 Comments
Mohammed A.
MA
No. You can use their trial to evaluate the product. Read more
I'm struggling with 1Password's secure sharing features. Can anyone explain the best way to use them?
3 Comments
Erick V.
EV
You can either use the share button in the object view, using afterward the option to input the email of the person you want to share the object with and...Read more
CentOS
CentOS Discussions
how to improve the customization of repositories?
1 Comment
AM
use a command like this: tcpdump -c 12 -i enp0s3 | grep "string search" You capture the traffic according to the filter set example: http, wget...Read more
How can I acheive client isolation ?
1 Comment
Robert R.
RR
When I was learning about client isolation I found this web article very helpful. I hope it will help you. ...Read more
Bolehkah ini digunakan untuk acara pembelajaran?
1 Comment
David W.
DW
Yes. You can run Moodle, or other learning management system (LMS) products on CentOS Linux, or event management software. There is a rich set of open source...Read more