Best Software for 2025 is now live!

Service Provider

Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Azure Dedicated HSM Alternatives

Azure Dedicated HSM Reviews & Provider Details

Janusz N.
JN
Senior IT Manager / DevOps Tech Lead/ Azure DevOps, Cloud Engineer | Data & Analytics
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Azure Dedicated HSM?

Azure Dedicated HSM allows you as a dedicated one to apply more configurations like algorithm or strength. Review collected by and hosted on G2.com.

What do you dislike about Azure Dedicated HSM?

Price could be better ;) but as a solution with is dedicated this is normal . Review collected by and hosted on G2.com.

What problems is Azure Dedicated HSM solving and how is that benefiting you?

Manage passwords, secreted and access to them. Review collected by and hosted on G2.com.

Azure Dedicated HSM Overview

Azure Dedicated HSM Details
Show LessShow More

Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,039,026 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
Phone
+1 (877) 276-2464
Total Revenue (USD mm)
$204,090
Description

Every company has a mission. What's ours? To empower every person and every organization to achieve more. We believe technology can and should be a force for good and that meaningful innovation contributes to a brighter world in the future and today. Our culture doesn’t just encourage curiosity; it embraces it. Each day we make progress together by showing up as our authentic selves. We show up with a learn-it-all mentality. We show up cheering on others, knowing their success doesn't diminish our own. We show up every day open to learning our own biases, changing our behavior, and inviting in differences. Because impact matters. Microsoft operates in 190 countries and is made up of approximately

8,000 passionate employees worldwide.

Recent Azure Dedicated HSM Reviews

Janusz N.
JN
Janusz N.Enterprise (> 1000 emp.)
3.5 out of 5
"Dedicated HSM as more configuration you need."
Azure Dedicated HSM allows you as a dedicated one to apply more configurations like algorithm or strength.
Aishwarya R.
AR
Aishwarya R.Mid-Market (51-1000 emp.)
3.5 out of 5
"Can work faster"
The security it offers, transperancy, modification

Azure Dedicated HSM Media

Answer a few questions to help the Azure Dedicated HSM community
Have you used Azure Dedicated HSM before?
Yes

1 out of 2 Total Reviews for Azure Dedicated HSM

3.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Aishwarya R.
AR
Cloud transformation engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Azure Dedicated HSM?

The security it offers, transperancy, modification Review collected by and hosted on G2.com.

What do you dislike about Azure Dedicated HSM?

Storing of encrypted data can be still accessed Review collected by and hosted on G2.com.

Recommendations to others considering Azure Dedicated HSM:

Make sure as a user you get more previlage while storing data as encrypted and visibility Review collected by and hosted on G2.com.

What problems is Azure Dedicated HSM solving and how is that benefiting you?

Faster way to store and access Review collected by and hosted on G2.com.

There are not enough reviews of Azure Dedicated HSM for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Rapid7 Security Services Logo
Rapid7 Security Services
3.8
(11)
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.
2
Cynomi vCISO Platform Logo
Cynomi vCISO Platform
4.9
(9)
Cynomi’s vCISO platform empowers MSSPs, MSPs and consultancies to offer structured cybersecurity services to SMEs at scale and provide them with proactive cyber resilience.  Combining proprietary AI algorithms with CISO-level knowledge, Cynomi’s platform streamlines the vCISO's work while automating manual time-consuming tasks.  Cynomi helps partners overcome the cybersecurity skill gap and scale their business, allowing them to offer new services and increase revenues while reducing operational costs.
3
2nd Watch Logo
2nd Watch
4.5
(8)
2nd Watch is an APN Premier Consulting Partner providing managed cloud to enterprises. The company's subject matter experts, software-enabled services and cutting-edge solutions provide companies with tested, proven, and trusted solutions, allowing them to fully leverage the power of the public cloud.
4
NCC Group Logo
NCC Group
4.3
(4)
Through an unrivalled suite of services, we provide organizations with peace of mind that that their most important assets are protected, available and operating as they should be at all times.
5
IAM Professional Services Logo
IAM Professional Services
4.5
(3)
Focal Point offers implementation and integration services for the leading IAM, IGA, and PAM tools on the market, including SailPoint, Ping, ForgeRock, CyberArk, Centrify, and Oracle. For organizations looking for the best strategy going forward, Focal Point offers rapid IAM assessments that benchmark your identity program and deliver tailored and business-smart recommendations for building a compliant, secure, and efficient identity program.
6
Little Snitch Logo
Little Snitch
5.0
(2)
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t. But you don’t notice anything, because all of this happens invisibly under the hood. Little Snitch makes these Internet connections visible and puts you back in control!
7
Thales Logo
Thales
4.0
(2)
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored.
8
Mitnick Security Logo
Mitnick Security
5.0
(1)
As the worlds most famous hacker, Kevin Mitnick has been the subject of countless news, movies and magazine articles published throughout the world. He has made guest appearances on numerous television and radio programs. Kevin's unparalleled experience leads the Global Ghost Team in testing the security of the worlds leading corporations and governments.
9
JuiceSSH Logo
JuiceSSH
5.0
(1)
JuiceSSH is an SSH client for Android that includes SSH, Local Shell, and Telnet support.
10
Fingerprint Cards AB Logo
Fingerprint Cards AB
4.5
(1)
Fingerprint Cards AB (FPC) markets, develops and produces biometric components and technologies that through the analysis and matching of an individuals unique fingerprint verify the persons identity.
Show More