+
+

Related Products

  • Passwork
    85 Ratings
    Visit Website
  • Auth0
    1,029 Ratings
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • Frontegg
    383 Ratings
    Visit Website
  • 1Password
    16,573 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website

About

A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.

About

Secure your container environment on GCP, GKE, or Anthos. Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale. As enterprises create more containerized workloads, security must be integrated at each stage of the build-and-deploy life cycle. Infrastructure security means that your container management platform provides the right security features. Kubernetes includes security features to protect your identities, secrets, and network, and Google Kubernetes Engine uses native GCP functionality—like Cloud IAM, Cloud Audit Logging, and Virtual Private Clouds—and GKE-specific features like application layer secrets encryption and workload identity to bring the best of Google security to your workloads. Securing the software supply chain means that container images are safe to deploy. This is how you make sure your container images are vulnerability free and that the images you build aren't modified.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations searching for an automated directory and authorization platform

Audience

Companies that want to container environment on GCP, GKE, or Anthos

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberArk
Founded: 2013
United States
conjur.org

Company Information

Google
Founded: 1998
United States
cloud.google.com/containers/security/

Alternatives

HashiCorp Vault

HashiCorp Vault

HashiCorp

Alternatives

RadiantOne

RadiantOne

Radiant Logic
KubeArmor

KubeArmor

AccuKnox

Categories

Categories

Integrations

AWS Marketplace
Aquera
Brainwave GRC
ClickSSL
DatAnswers
Intellicta
Kubernetes
Notus
OfficeSpace Software
PangaeAPI
Qualys WAS
SCADAfence
Sandfly Security
Sonrai Security
Terraform
ThreatAware
XYGATE SecurityOne

Integrations

AWS Marketplace
Aquera
Brainwave GRC
ClickSSL
DatAnswers
Intellicta
Kubernetes
Notus
OfficeSpace Software
PangaeAPI
Qualys WAS
SCADAfence
Sandfly Security
Sonrai Security
Terraform
ThreatAware
XYGATE SecurityOne
Claim CyberArk Conjur and update features and information
Claim CyberArk Conjur and update features and information
Claim Google Cloud Container Security and update features and information
Claim Google Cloud Container Security and update features and information