
ggshield
A command-line interface tool for detecting and preventing hardcoded secrets in source code.
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
A command-line interface tool for detecting and preventing hardcoded secrets in source code.
AWS Identity and Access Management (IAM) provides a robust framework for managing access to AWS resources, enabling fine-grained access control through identities and policies.
A robust secrets management system that integrates Role-Based Access Control (RBAC) and security best practices to secure access to critical infrastructure and data.
Azure Policy helps maintain consistent resource governance and compliance at scale within Azure environments by creating, assigning, and managing policy definitions.
A platform for managing sensitive application secrets securely in cloud and DevOps environments.
A service that helps organizations ensure regulatory compliance and data residency in cloud environments by applying specific control packages to Google Cloud folders.
A deprecated tool for managing and distributing secrets within infrastructure environments.
Automates evidence collection and audit processes for continuous compliance and risk assessment in AWS environments.
A platform for managing application secrets and configuration across diverse teams and infrastructure, ensuring security and operational efficiency.
AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.
A tool for managing and securing sensitive data such as tokens, passwords, certificates, and API keys.
A cloud security tool that provides a unified view of cloud resources, enhancing security operations and ensuring compliance across multi-cloud environments.