It's been two months since this profile received a new review
Leave a Review

Infisical Reviews & Product Details

Profile Status

This profile is currently managed by Infisical but has limited features.

Are you part of the Infisical team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Infisical before?

Answer a few questions to help the Infisical community

Infisical Reviews (4)

Reviews

Infisical Reviews (4)

5.0
4 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
RB
Software Engineer
Mid-Market (51-1000 emp.)
"Incredible developer-centric secret ops/management platform!"
What do you like best about Infisical?

Infisical made our dev team instantly more productive from the moment we onboarded. We used to labor over making sure our .env files were in sync; Infisical quickly got rid of that. Furthermore, as we've grown as an org, we've since been able to embrace their more advanced features like secret rotations, granular access controls and their plethora of 3rd party integrations with other services we use.

Highly recommend it! Review collected by and hosted on G2.com.

What do you dislike about Infisical?

Nothing to date - the Infisical team is A+ at receiving feedback or product feature requests and incorporating it onto their roadmap. They've dealt with any issues my team or I had super quick and keep me updated on the progress of things too. Review collected by and hosted on G2.com.

Vamsi S.
VS
CTO
Computer Software
Small-Business (50 or fewer emp.)
"Developer-focused secret manager"
What do you like best about Infisical?

It is very easy to set up and use – even for some very complex infrastructure environments (e.g., Multicloud and on-prem). Supports a variety of hosting options and is integrated into everything we do - we use it for everywhere on the product. Review collected by and hosted on G2.com.

What do you dislike about Infisical?

Not much to say here - works perfectly for us Review collected by and hosted on G2.com.

Han W.
HW
Co-Founder
Small-Business (50 or fewer emp.)
"Great all-in-one tool for secret management"
What do you like best about Infisical?

Infisical helps us centralize our secrets across our infrastructure to the point that it’s never an issue anymore. Infisical integrates with 100% of our tech stack and provides API, CLI, SDKs, and beautiful user interface for managing resources/secrets. Bonus point is that you can self-host it on your own infra or use the cloud-hosted product if that’s easier. Review collected by and hosted on G2.com.

What do you dislike about Infisical?

Nothing comes to mind. Infisical is by far the best option out of all the ones we considered. Review collected by and hosted on G2.com.

Ben G.
BG
CTO
Small-Business (50 or fewer emp.)
"Infisical is a game changer!"
What do you like best about Infisical?

Infisical has made secret management incredibly simple for our team. We were able to easily integrate it into our system and are huge fans of the system! Review collected by and hosted on G2.com.

What do you dislike about Infisical?

Nothing! The team is super quick to respond and the functionality is exactly what we're looking for. Review collected by and hosted on G2.com.

There are not enough reviews of Infisical for G2 to provide buying insight. Below are some alternatives with more reviews:

1
1Password Logo
1Password
4.6
(1,721)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
2
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,186)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
3
Akeyless Identity Security Platform Logo
Akeyless Identity Security Platform
4.6
(84)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
4
Doppler secrets management platform Logo
Doppler secrets management platform
4.8
(61)
Doppler’s developer-first secrets management platform empowers teams to seamlessly orchestrate, govern, and control secrets across any environment at scale.
5
HashiCorp Vault Logo
HashiCorp Vault
4.3
(46)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
6
Azure Key Vault Logo
Azure Key Vault
4.5
(55)
Azure Key Vault is a cloud service designed to securely store and manage cryptographic keys, secrets, and certificates used by applications and services. It enables organizations to safeguard sensitive information such as API keys, passwords, and connection strings, ensuring that these secrets are protected and accessible only to authorized users and applications. By centralizing the management of keys and secrets, Azure Key Vault helps maintain compliance with security standards and simplifies the administration of cryptographic materials. Key Features and Functionality: - Secrets Management: Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets. - Key Management: Easily create and control the encryption keys used to encrypt your data. - Certificate Management: Provision, manage, and deploy public and private Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates for use with Azure and your internal connected resources. - Access Control: Integrates with Azure Active Directory (Azure AD) to provide fine-grained access control through role-based access control (RBAC) and access policies. - Monitoring and Logging: Monitor and audit key usage with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection. - Integration with Azure Services: Seamlessly integrates with other Azure services, such as Azure Storage, Azure SQL Database, and Azure App Service, allowing applications to retrieve and use secrets, certificates, and keys securely without needing to store sensitive information in application code or configuration files. Primary Value and Problem Solved: Azure Key Vault addresses the critical need for secure and efficient management of cryptographic keys and secrets in cloud environments. By centralizing the storage and access control of sensitive information, it reduces the risk of accidental leaks and unauthorized access. The service simplifies the process of key and secret management, allowing developers to focus on application development without the burden of implementing custom security solutions. Additionally, Azure Key Vault enhances compliance with security standards and regulations by providing robust access controls, monitoring capabilities, and integration with Azure's security ecosystem.
7
BeyondTrust Password Safe Logo
BeyondTrust Password Safe
4.5
(45)
Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential. Password Safe enables organizations to achieve complete control and accountability over privileged accounts.
8
Delinea Secret Server Logo
Delinea Secret Server
4.4
(41)
Delinea Secret Server (formerly Thycotic Secret Server) is a fully-featured Privileged Access Management (PAM) solution available both on-premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution. Delinea is doing things differently from the traditional complex, disconnected security tools by making it easy to discover, control, change and audit privileged accounts across any organization with Secret Server.
9
AWS Secrets Manager Logo
AWS Secrets Manager
4.5
(18)
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
10
CyberArk Conjur Logo
CyberArk Conjur
4.5
(17)
For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Infisical