Top Rated Confidant Alternatives
(67)
4.6 out of 5
Visit Website
Sponsored
1 Confidant Reviews
4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.

HB
Harsha Raj B.
Software Application Developer
Small-Business(50 or fewer emp.)
There are not enough reviews of Confidant for G2 to provide buying insight. Below are some alternatives with more reviews:
1
1Password
4.7
(1,362)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
2

Keeper Password Manager
4.6
(1,051)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
3
Akeyless Platform
4.6
(67)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
4
Doppler secrets management platform
4.8
(55)
Doppler’s developer-first secrets management platform empowers teams to seamlessly orchestrate, govern, and control secrets across any environment at scale.
5
Azure Key Vault
4.4
(57)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
6
HashiCorp Vault
4.3
(45)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
7
Delinea Secret Server
4.3
(40)
Delinea Secret Server (formerly Thycotic Secret Server) is a fully-featured Privileged Access Management (PAM) solution available both on-premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.
Delinea is doing things differently from the traditional complex, disconnected security tools by making it easy to discover, control, change and audit privileged accounts across any organization with Secret Server.
8

AWS Secrets Manager
4.4
(23)
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
9

Google Cloud Key Management Service
4.5
(18)
Google Cloud KMS is a cloud-hosted key management service that lets users manage encryption for their cloud services the same way they do on-premises.
10
CyberArk Conjur
4.5
(17)
For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.