Sicherheitsintegrationen
Keeper works out-of-the-box with with password rotation, passwordless authentication, SSO, SIEM, SDK, MFA and CI/CD applications.

AI Integrations
Integrations enabling AI assistants and agents to securely access vault credentials through standardized protocols for automated workflows and intelligent applications.
Access Management
Controls user authentication and authorization through Single Sign-On, Multi-Factor Authentication, SCIM provisioning, and centralized identity policies across cloud and on-premises environments.
Okta by OktaOkta provides cloud-based identity and access management solutions including Single Sign-On, Multi-Factor Authentication, Lifecycle Management, and API Access Management. It integrates with over 7,000 applications to secure workforce and customer identities.
Entra ID (formerly Azure Active Directory) by MicrosoftMicrosoft Entra ID (formerly Azure Active Directory) is a cloud-based identity and access management service. It provides single sign-on, multi-factor authentication, conditional access, and identity governance for securing access to applications and resources.
Ping Identity by Ping IdentityPing Identity provides intelligent identity solutions for securing enterprise workforce and customer access. It offers SSO, MFA, access management, directory services, and API security to enable zero trust security and seamless digital experiences.
IBM Security Verify by IBMIBM Security Verify is an identity-as-a-service platform that provides SSO, MFA, and adaptive access controls. It uses AI to analyze risk and automate identity decisions while protecting against identity-based threats.
Google Workspace by GoogleGoogle Workspace is a collection of cloud-based productivity and collaboration tools including Gmail, Drive, Docs, and Meet. It provides identity management with SSO, security controls, and endpoint management for organizations.
OneLogin by OneLoginOneLogin provides cloud-based identity and access management including SSO, MFA, and user provisioning. It secures access to applications for employees and customers while streamlining identity management for IT teams.
Auth0 by OktaAuth0, an Okta company, provides a flexible authentication and authorization platform for applications. It offers universal login, SSO, MFA, and social login capabilities that developers can implement with minimal code.
Microsoft ADFS by MicrosoftMicrosoft Active Directory Federation Services (ADFS) provides single sign-on access to systems and applications located across organizational boundaries. It uses claims-based authentication to securely share identity information between trusted partners.
AWS by AWSAmazon Web Services provides on-demand cloud computing services including compute, storage, database, and machine learning. AWS offers over 200 services from data centers globally for organizations of all sizes.
CloudGate UNO by CloudGate UNOCloudGate UNO provides identity and access management for Japanese enterprises with SSO, MFA, and access controls. It integrates with domestic and international cloud services to secure workforce access.
DUO SSO by CiscoDuo Security, a Cisco company, provides zero-trust security solutions including multi-factor authentication, single sign-on, and device trust. It verifies user identity and device health before granting access to applications.
Email Auto ProvisioningEmail auto provisioning enables automated user account creation based on email domain verification. It streamlines user onboarding by automatically creating accounts when users sign up with verified email addresses.
F5 by F5F5 provides application security and delivery solutions including access management, web application firewall, and API security. Its BIG-IP Access Policy Manager enables secure remote access and SSO for enterprise applications.
HENNGE by HENNGEHENNGE provides cloud security solutions including SSO, MFA, and email security for organizations in Japan and Asia. Its HENNGE One platform secures access to Microsoft 365 and other cloud services.
IBM Security by IBMIBM is a leading provider of global hybrid cloud and AI, and consulting expertise. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain a competitive edge in their industries.
Imprivata Enterprise Access Management by ImprivataImprivata is the digital identity company for life- and mission-critical industries. Our solutions manage and secure access to technology that powers essential services.
JumpCloud by JumpCloudJumpCloud provides a cloud directory platform that unifies identity, access, and device management. It offers SSO, MFA, directory services, and endpoint management from a single console for managing users across all IT resources.
PingOne by Ping IdentityPingOne is a cloud-based identity-as-a-service platform that provides SSO, MFA, and directory services. It enables organizations to secure workforce and customer identities with flexible deployment options.
RSA SecurID Access by RSARSA SecurID provides identity and access management with multi-factor authentication and risk-based access controls. It offers hardware tokens, software authenticators, and mobile push authentication for secure access to applications.
Rippling by RipplingRippling is the first way for businesses to manage all of their HR, IT, and Finance—payroll, benefits, expenses, apps, devices and more—in one unified workforce platform.
SCIMSCIM (System for Cross-domain Identity Management) is an open standard protocol for automating user provisioning and deprovisioning across cloud applications and identity systems.
SSO (SAML 2.0)SAML (Security Assertion Markup Language) 2.0 is an XML-based standard for exchanging authentication and authorization data between identity providers and service providers, enabling single sign-on across security domains.
SecureAuth by SecureAuthSecureAuth provides adaptive authentication and access management solutions that verify identities using continuous risk assessment. It offers passwordless authentication, MFA, and SSO to secure workforce and customer access.
Shibboleth by ShibbolethShibboleth is an open-source federated identity solution that provides single sign-on capabilities across organizational boundaries. It is widely used by academic institutions for secure access to research and educational resources.
Thales SafeNet Trusted Access by Thales GroupThales SafeNet Trusted Access provides cloud-based access management with SSO and MFA capabilities. It secures access to cloud and web applications using smart single sign-on and scenario-based access policies.
Browser Extensions
Browser-based tools that integrate password management and autofill capabilities directly into web browsers for seamless credential access and secure login experiences.
Chrome by GoogleGoogle Chrome is a web browser that provides password management, synchronization across devices, and built-in security features. It offers extensions for enhanced password management and autofill capabilities.
Safari by AppleSafari is Apple's web browser that includes built-in password management with iCloud Keychain. It provides password generation, storage, and synchronization across Apple devices.
Edge by MicrosoftMicrosoft Edge is a web browser with built-in password management and Microsoft account synchronization. It provides password generation, monitoring, and autofill across devices.
Firefox by MozillaFirefox is an open-source web browser from Mozilla that includes built-in password management. It provides password synchronization, breach alerts, and privacy-focused features.
Brave by BraveBrave is a privacy-focused web browser that blocks ads and trackers by default. It includes built-in password management and supports importing passwords from other browsers.
Opera by OperaOpera is a web browser that includes built-in password management and synchronization. It provides a free VPN, ad blocker, and secure password storage with encryption.
Cloud Services
Cloud infrastructure platforms providing compute, storage, database, and platform services that host applications and data requiring secure credential and secrets management.
AWS by AmazonAmazon Web Services provides on-demand cloud computing services including compute, storage, database, and machine learning. AWS offers over 200 services from data centers globally for organizations of all sizes.
Azure Client Secrets by MicrosoftAzure Client Secrets are credentials used by applications to authenticate with Azure Active Directory. They enable service principals to access Azure resources without interactive user authentication.
AWS Access Keys by AmazonAWS Access Keys are long-term credentials for IAM users or the AWS account root user. They consist of an access key ID and secret access key used to sign programmatic requests to AWS services.
Heroku by HerokuHeroku is a cloud platform as a service that enables developers to build, run, and scale applications. It supports multiple programming languages and provides add-ons for databases, monitoring, and other services.
Snowflake by SnowflakeSnowflake delivers the AI Data Cloud—a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance.
Collaboration
Business communication and project management platforms that integrate with Keeper for secure credential sharing, access requests, and security alert management.
Slack by SlackSlack is a business communication platform offering real-time messaging, file sharing, and integrations with enterprise tools. The Keeper Slack app enables secure credential sharing and vault access within Slack workspaces.
Jira Workflow by AtlassianJira is a project management and issue tracking platform used by software development and IT teams. The Keeper Jira Workflow integration enables request-based access management through Jira issues.
Container Platforms
Container orchestration and runtime environments that package and deploy applications, requiring secure injection of credentials and secrets into containerized workloads.
Docker Image by DockerDocker is a platform for developing, shipping, and running applications in containers. It packages applications with their dependencies into standardized units that can run consistently across different computing environments.
Docker Container Runtime by DockerDocker provides container runtime that enables applications to run in isolated environments. Containers share the host OS kernel while maintaining isolation, making them lightweight and portable across infrastructure.
Kubernetes by KubernetesKubernetes is an open-source container orchestration platform that automates deployment, scaling, and management of containerized applications. It provides service discovery, load balancing, and self-healing capabilities.
Dark Web Monitoring
Continuously scans dark web forums, marketplaces, and data dumps to detect exposed credentials and alert organizations to potential breaches before they are exploited.
DevOps Platforms
CI/CD and version control platforms that automate software build, test, and deployment pipelines, requiring secure credential injection throughout the development lifecycle.
Jenkins by JenkinsJenkins is an open-source automation server that enables continuous integration and continuous delivery. It provides hundreds of plugins to support building, testing, and deploying applications across various platforms.
Github Actions by GithubGitHub Actions is a CI/CD platform integrated into GitHub that automates software workflows. It enables developers to build, test, and deploy code directly from their repositories using customizable workflow definitions.
Gitlab by GitlabGitLab is the most comprehensive AI-powered DevSecOps platform for software innovation. We enable organizations to increase developer productivity, improve operational efficiency, reduce security and compliance risk.
Azure DevOps by MicrosoftAzure DevOps provides developer services for building, testing, and deploying applications. It includes Azure Repos for version control, Azure Pipelines for CI/CD, and Azure Artifacts for package management.
JFrog Artifactory by JFrogJFrog Artifactory is a universal artifact repository manager that stores and manages binary artifacts, container images, and packages throughout the software development lifecycle. Integrates with CI/CD pipelines for automated artifact management.
Bitbucket by AtlassianBitbucket is a Git-based code hosting and collaboration platform from Atlassian. It provides source code management, pull requests, CI/CD pipelines, and integrations with Jira for software development teams.
Git by GitGit is a distributed version control system for tracking changes in source code during software development. It enables collaboration, branching, and merging for teams building software.
Octopus Deploy by OctopusOctopus Deploy is a deployment automation platform that takes over where CI servers end. It manages releases, deployments, and runbook automation across cloud and on-premises infrastructure.
TeamCity by JetBrainsTeamCity is a CI/CD server from JetBrains that automates building, testing, and deploying applications. It supports multiple programming languages and integrates with popular development tools and cloud platforms.
Developer Tools
IDEs, code editors, and productivity tools that integrate with Keeper for seamless credential access, password generation, and secrets management during development.
Raycast by RaycastRaycast is a macOS productivity launcher that provides fast access to tools, scripts, and extensions. The Keeper extension enables quick vault access, credential retrieval, password generation, and TOTP code copying directly from the Raycast interface.
JetBrains IDE by JetBrainsJetBrains develops integrated development environments including IntelliJ IDEA, PyCharm, WebStorm, and other IDEs for professional software development. The Keeper plugin integrates Commander CLI into JetBrains workflows.
Visual Studio Code by MicrosoftVisual Studio Code is a lightweight, cross-platform source code editor with support for debugging, syntax highlighting, intelligent code completion, and extensions. The Keeper extension integrates Commander CLI into VS Code workflows.
Directory Services
Centralized identity repositories that store and manage user accounts, groups, and authentication policies for enterprise environments and application access control.
- Active Directory by MicrosoftMicrosoft Active Directory is a directory service for Windows domain networks that provides authentication and authorization services. It stores information about network resources and enables administrators to manage permissions and access to network resources.
Okta by OktaOkta provides cloud-based identity and access management solutions including Single Sign-On, Multi-Factor Authentication, Lifecycle Management, and API Access Management. It integrates with over 7,000 applications to secure workforce and customer identities.
Entra ID (formerly Azure AD) by MicrosoftMicrosoft Entra ID (formerly Azure Active Directory) is a cloud-based identity and access management service. It provides single sign-on, multi-factor authentication, conditional access, and identity governance for securing access to applications and resources.
LDAPLDAP (Lightweight Directory Access Protocol) is a protocol for accessing and managing directory services over a network. It is used for storing user credentials and organizational data for authentication.- Microsoft Windows Active Directory by MicrosoftMicrosoft Active Directory is a directory service for Windows domain networks that provides authentication and authorization services. It stores information about network resources and enables administrators to manage permissions and access to network resources.
IGA
Identity Governance and Administration platforms that manage user lifecycle, access certifications, role management, and compliance reporting across enterprise applications and systems.
SailPoint by SailPoint Identity Security CloudSailPoint provides AI-driven identity security solutions for the enterprise. Its platform automates identity governance, access management, and compliance by managing user access to applications and data across hybrid IT environments.
Saviynt by Saviynt Identity CloudSaviynt provides a cloud-native identity governance platform that combines IGA, privileged access management, and application access governance. It uses AI and machine learning to manage identities, enforce policies, and ensure compliance.
ConductorOneConductorOne integrates via REST API/SCIM. ConductorOne manages access reviews and requests; Keeper EPM enforces just-in-time privilege elevation on Windows/Linux/macOS endpoints.
LumosLumos is an identity governance platform that helps IT teams automate access requests, manage software licenses, and maintain security compliance. It provides visibility into SaaS application usage and streamlines access management workflows.
Opal by OpalOpal Security provides just-in-time access management for cloud infrastructure. It enables organizations to implement zero-standing-privileges by automating temporary access grants and reducing persistent access to sensitive systems.
ITSM
Enterprise platforms for managing IT service delivery, incident response, change management, and workflow automation with integrated credential and access controls.
ServiceNow by ServiceNowServiceNow provides cloud-based workflow automation for IT service management, security operations, and business processes. Its platform digitizes workflows to improve productivity and employee experience.
Jira ITSM by AtlassianJira Service Management provides IT service management capabilities including incident management, problem management, and change management. The Keeper ITSM integration converts security alerts into actionable Jira tickets.
ServiceNow ITSM by ServiceNowServiceNow provides cloud-based IT service management, IT operations management, and IT business management solutions. The Keeper ITSM integration enables secure ingestion of security alerts into ServiceNow SIR.
Infrastructure as Code
Tools that define and provision infrastructure through code and configuration files, requiring secure credential management for automated deployments and system configuration.
Terraform by HashicorpHashiCorp Terraform is an infrastructure as code tool that enables teams to define and provision cloud resources using declarative configuration files. It supports multi-cloud environments and provides state management for infrastructure lifecycle.
Ansible by Red HatAnsible is an open-source automation platform for configuration management, application deployment, and task automation. It uses simple YAML playbooks to automate IT infrastructure without requiring agents on managed nodes.
AWS CLI by AmazonAWS Command Line Interface is a unified tool for managing AWS services from the command line. It enables automation of AWS operations through scripts and provides direct access to AWS service APIs.
Ansible Tower by RedhatRed Hat Ansible Tower provides a web-based UI and API for Ansible automation. It adds role-based access control, job scheduling, and centralized logging to Ansible for enterprise automation at scale.
Chef by Progress ChefChef is an infrastructure automation platform that uses code to manage server configurations. It ensures systems are configured correctly and consistently using reusable configuration policies.
PowerShell by MicrosoftPowerShell is a cross-platform task automation solution from Microsoft. It provides a command-line shell, scripting language, and configuration management framework for Windows, Linux, and macOS.
Puppet by PerforcePuppet provides infrastructure automation for managing configuration across servers and cloud resources. It uses declarative language to define system state and automatically enforces that configuration.
Multi-Factor Authentication
Authentication solutions that require multiple verification methods beyond passwords, including hardware tokens, mobile apps, biometrics, and push notifications for enhanced security.
Duo by DuoDuo Security, a Cisco company, provides zero-trust security solutions, including multi-factor authentication and device trust, to protect the modern workforce.
Microsoft Authenticator by MicrosoftMicrosoft Authenticator is a mobile app that provides multi-factor authentication using push notifications, TOTP codes, and passwordless sign-in. It supports personal Microsoft accounts and enterprise Azure AD accounts.
Google Authenticator by GoogleGoogle Authenticator is a mobile app that generates time-based one-time passwords for two-factor authentication. It works offline and supports TOTP-enabled accounts across various services.
Yubikey by YubicoYubiKey is a hardware security key that provides strong authentication using FIDO2, U2F, and OTP protocols. It protects against phishing and account takeover by requiring physical presence for authentication.
TOTPTime-based One-Time Password (TOTP) is an algorithm that generates temporary passcodes based on the current time and a shared secret. It is widely used for multi-factor authentication in security applications.
Android Smartwatch by GoogleAndroid smartwatches running Wear OS provide notifications and quick access to applications. They can display two-factor authentication codes and notifications for secure account access.
Apple Watch by AppleApple Watch is a smartwatch that works with iPhone to provide notifications, fitness tracking, and authentication features. It supports two-factor authentication and can display verification codes for secure account access.
Google Titan Key by GoogleGoogle Titan Security Key is a FIDO-certified hardware device for two-factor authentication. It uses cryptographic verification to protect accounts against phishing attacks.
RSA SecureID by RSARSA provides identity and access management, integrated risk management, and fraud prevention solutions that help organizations manage risk and protect digital interactions.
SMS Text MessageSMS-based authentication sends one-time verification codes via text message to a registered phone number. It provides an additional layer of security for account access beyond passwords.
Network Infrastructure
Network devices and management platforms including routers, switches, and firewalls that require secure credential storage and automated password rotation.
Cisco IOS XE by CiscoCisco IOS XE is a network operating system for Cisco routers and switches. It provides modular architecture, high availability, and programmability for enterprise and service provider networks.
Cisco Meraki by CiscoCisco Meraki provides cloud-managed IT solutions including wireless, switching, security, and SD-WAN. It offers centralized management through a web-based dashboard for simplified network operations.
Operating Systems
Desktop and server operating systems that integrate with credential management for secure login, certificate storage, and system-level authentication.
Windows by MicrosoftMicrosoft Windows is an operating system for personal computers, servers, and embedded devices. It provides user interface, file management, and enterprise features for desktop and server computing.
Linux by LinuxLinux is an open-source operating system kernel that powers servers, containers, and embedded systems worldwide. It provides the foundation for enterprise computing, cloud infrastructure, and DevOps environments.
Password Management
Solutions for securely storing, generating, and sharing passwords across individuals and teams, with migration paths from competing password managers.
LastPass by LastPassLastPass is a password manager that stores encrypted passwords in the cloud. It provides password generation, secure sharing, dark web monitoring, and autofill capabilities across browsers and devices.
1Password by 1Password1Password is a password manager that stores passwords, credit cards, and sensitive documents in encrypted vaults. It provides secure password sharing for teams and integrates with SSO providers.
Bitwarden by BitwardenBitwarden is an open-source password manager that stores credentials in an encrypted vault. It offers password generation, secure sharing, and self-hosting options for individuals and organizations.
Dashlane by DashlaneDashlane is a password manager and digital wallet that stores passwords and personal information securely. It provides password health scoring, dark web monitoring, and VPN protection.
KeePass by KeePassKeePass is a free, open-source password manager that stores passwords in an encrypted local database. It supports plugins for additional functionality and does not require cloud storage.
Avast by AvastAvast provides cybersecurity software including antivirus, password management, and VPN. Its password manager stores credentials securely and provides one-click login across devices and browsers.
Chrome by GoogleGoogle Chrome is a web browser that provides password management, synchronization across devices, and built-in security features. It offers extensions for enhanced password management and autofill capabilities.
EnPass by EnPassEnpass is an offline password manager that stores credentials locally or in user-chosen cloud storage. It provides password generation, secure notes, and cross-platform synchronization without storing data on vendor servers.
Excel by MicrosoftMicrosoft Excel is a spreadsheet application for data organization, analysis, and visualization. Keeper integrates with Excel for importing and exporting password data in structured formats.
Kaspersky by KasperskyKaspersky provides cybersecurity solutions including antivirus, endpoint protection, and password management. Its password manager stores credentials securely and syncs across devices.
KeePassXC by KeePassKeePassXC is a cross-platform, open-source password manager compatible with KeePass databases. It provides browser integration, YubiKey support, and secure password storage without cloud dependencies.
MacPass by MacPassMacPass is a free, open-source password manager for macOS compatible with KeePass databases. It provides a native Mac interface for managing passwords stored in encrypted databases.
Passpack by PasspackPasspack is a team password manager that enables secure credential sharing for organizations. It provides access controls, password policies, and audit logs for managing shared passwords.
Password Boss by Password BossPassword Boss is a password manager that stores credentials securely with AES-256 encryption. It provides password sharing, dark web monitoring, and emergency access for individuals and businesses.
Roboform by RoboformRoboForm is a password manager that stores passwords and fills forms automatically. It provides password generation, secure sharing, and synchronization across devices for individuals and businesses.
SplashID by SplashIDSplashID is a password manager and digital wallet that stores passwords, credit cards, and IDs. It provides secure synchronization across devices and supports biometric authentication.
Sticky Password by Sticky PasswordSticky Password is a password manager that stores credentials locally or in the cloud. It provides biometric authentication, secure sharing, and portable USB installation options.
Text File (.csv)CSV (Comma-Separated Values) is a file format for storing tabular data in plain text. It is widely used for importing and exporting data between applications and database systems.
True Key by True KeyTrue Key, by McAfee, is a password manager that uses multi-factor authentication for vault access. It stores passwords securely and provides facial recognition and fingerprint authentication.
Zoho by ZohoZoho Vault is an enterprise password manager that stores and manages passwords securely for teams. It provides SSO integration, access controls, and password sharing with audit trails.
mSecure by mSecuremSecure is a password manager and digital vault that stores passwords, credit cards, and secure notes. It provides local and cloud synchronization options with AES-256 encryption.
Passwordless Authentification
Authentication solutions that eliminate passwords using biometrics, hardware keys, or device-based verification for frictionless and phishing-resistant login experiences.
HYPR by HYPRHYPR provides True Passwordless authentication that eliminates shared secrets by turning smartphones into secure FIDO authenticators. It replaces passwords with biometric and device-bound credentials for enterprise security.
Veridium by VeridiumVeridium provides passwordless authentication using biometrics including fingerprint, face, and behavioral analysis. It eliminates passwords while maintaining security and user convenience for enterprise applications.
Auth0 by Auth0Auth0, an Okta company, provides a flexible authentication and authorization platform for applications. It offers universal login, SSO, MFA, and social login capabilities that developers can implement with minimal code.
PureID by PureIDPureID provides zero-friction passwordless authentication that eliminates passwords while protecting against credential-based attacks. It uses device-bound credentials for secure enterprise access.
Secret Double Octopus by Secret Double OctopusSecret Double Octopus provides enterprise passwordless authentication that eliminates passwords for workforce identity. It supports workstations, servers, VPNs, and applications without password dependencies.
TraitWare by TraitWareTraitWare provides passwordless multi-factor authentication that eliminates passwords and usernames. It uses device-bound credentials and biometrics for secure, phishing-resistant authentication.
Transmit Security by Transmit SecurityTransmit Security provides a customer identity platform with passwordless authentication, fraud prevention, and identity verification. It enables secure, frictionless digital experiences without passwords.
Trusona by TrusonaTrusona provides passwordless authentication that verifies user identity and device integrity in real-time. It uses cryptographic proof of identity without passwords to prevent credential-based attacks.
Privileged Access Management
Controls and monitors access to critical systems and sensitive data through privileged credential vaulting, session recording, and just-in-time access provisioning.
Keeper Connection Manager by Keeper SecurityKeeper Connection Manager provides secure, zero-trust remote access to infrastructure without VPN requirements. It enables privileged session management for RDP, SSH, VNC, and database connections through a web browser.
Keeper Connection Manager by Keeper SecurityKeeper Connection Manager provides secure, zero-trust remote access to infrastructure without VPN requirements. It enables privileged session management for RDP, SSH, VNC, and database connections through a web browser.
Centrify by DelineaDelinea (formerly Centrify) provides privileged access management solutions for securing administrative access to infrastructure. It offers just-in-time privilege elevation, session monitoring, and secrets management.
Devolutions by DevolutionsDevolutions provides remote access and password management solutions for IT teams. Its products include Remote Desktop Manager for remote connections and Devolutions Server for team password management.
SDK
Software development kits and libraries that enable developers to programmatically integrate secrets retrieval and credential management into custom applications.
PythonPython is a high-level programming language emphasizing code readability and simplicity. It is widely used for web development, data science, automation, and scripting with extensive library support.
JavaScriptJavaScript is a programming language that enables interactive web pages and is essential for front-end development. It also runs server-side via Node.js and powers modern web applications.
JavaJava is an object-oriented programming language designed for portability across platforms. It is used for enterprise applications, Android development, and large-scale distributed systems.
GoLangGo (Golang) is a statically typed programming language developed by Google. It provides efficient concurrency, fast compilation, and is commonly used for cloud infrastructure and microservices.
.NETMicrosoft .NET is a developer platform for building applications across web, mobile, desktop, and cloud. It provides runtime, libraries, and tools for C#, F#, and Visual Basic development.
KotlinKotlin is a modern programming language that runs on the Java Virtual Machine. It is the preferred language for Android development and provides concise syntax with Java interoperability.
RustRust is a systems programming language focused on safety, speed, and concurrency. It prevents memory errors at compile time and is used for performance-critical applications and systems programming.
SIEM
Security Information and Event Management platforms that collect, correlate, and analyze security logs to detect threats and enable incident response.
Splunk by SplunkSplunk is a data platform for security and observability that captures, indexes, and correlates real-time data in a searchable repository. It provides SIEM, SOAR, and IT service intelligence solutions that help organizations detect threats, investigate incidents, and ensure system reliability.
Azure Sentinel by MicrosoftMicrosoft Sentinel is a cloud-native SIEM and SOAR solution that delivers intelligent security analytics and threat intelligence across the enterprise. It collects data at cloud scale, detects previously undetected threats, and responds rapidly with built-in orchestration and automation.
IBM Security QRadar by IBMIBM Security QRadar is a SIEM platform that provides security intelligence by analyzing log data, network flows, and user behavior. It detects threats in real-time, prioritizes alerts, and provides automated responses to security incidents across on-premises and cloud environments.
Securonix by SecuronixSecuronix provides a Unified Defense SIEM platform that combines SIEM, UEBA, SOAR, and security data lake capabilities. It uses advanced analytics and machine learning to detect insider threats, cyberattacks, and fraud while reducing false positives and investigation time.
Exabeam by ExabeamExabeam delivers AI-driven security operations with its Security Operations Platform that includes SIEM, UEBA, and SOAR capabilities. It uses behavioral analytics and automation to detect threats, triage alerts, and accelerate incident response.
Google Security Operations (Chronicle) by GoogleGoogle Security Operations (formerly Chronicle) is a cloud-native security operations platform that enables threat detection, investigation, and response at Google speed and scale. It ingests and normalizes security telemetry data and applies Google's threat intelligence to identify threats.
AT&T Cybersecurity by AT&TAT&T Cybersecurity provides threat detection and response solutions powered by the expertise of the AT&T Chief Security Office.
AWS by AmazonAmazon Web Services provides on-demand cloud computing services including compute, storage, database, and machine learning. AWS offers over 200 services from data centers globally for organizations of all sizes.
Azure Log Analytics by MicrosoftAzure Log Analytics is a service that collects and analyzes log data from cloud and on-premises resources. It provides query capabilities for troubleshooting, security analysis, and compliance monitoring.
Crowdstrike Falcon NG-SIEM by CrowdstrikeCrowdStrike Falcon provides a cloud-native platform for endpoint protection, threat intelligence, and security operations. Its next-gen SIEM capabilities deliver real-time threat detection and response using AI and behavioral analytics.
Datadog by DatadogDatadog is an observability and security platform for cloud applications that monitors servers, databases, and services. It provides infrastructure monitoring, APM, log management, and cloud security posture management in a unified platform.
Devo by DevoDevo provides a cloud-native security analytics platform that enables real-time visibility and threat detection at enterprise scale. It offers unlimited data ingestion, sub-second search, and AI-powered analytics for security operations centers.
Elastic ELK by ElasticElastic provides a search-powered platform for security, observability, and enterprise search. The Elastic Stack (ELK) enables organizations to ingest, search, and analyze log data at scale for threat detection, monitoring, and compliance.
LogRhythm by LogRhythmLogRhythm provides a SIEM platform that combines log management, security analytics, UEBA, and SOAR in a unified solution. It helps security teams detect threats, investigate incidents, and respond quickly while meeting compliance requirements.
Logpoint by LogpointLogpoint provides a converged SIEM platform that combines SIEM, SOAR, UEBA, and business-critical security capabilities. It helps organizations detect and respond to cyber threats while maintaining compliance across hybrid environments.
ManageEngine Log360 by ManageEngineManageEngine offers enterprise IT management software for your service management, operations management, Active Directory and security needs.
Rapid7 InsightIDR by Rapid7Rapid7 is advancing security with visibility, analytics, and automation delivered through the Insight cloud. Our solutions simplify the complex to help security teams reduce vulnerabilities.
Scalyr by ScalyrScalyr, now part of Dataset, provides fast, powerful log management and observability solutions for DevOps and engineering teams.
SolarWinds by SolarWindsSolarWinds provides IT management software for network monitoring, systems management, and security. Its Security Event Manager delivers SIEM capabilities including log collection, correlation, and automated threat response for IT infrastructure.
Sumo Logic by Sumo LogicSumo Logic is a cloud-native machine data analytics platform that provides real-time security monitoring and threat detection. It ingests and analyzes log and metrics data to deliver actionable insights for security operations and DevSecOps.
Syslog PushSyslog is a standard protocol for sending log messages to a central server for storage and analysis. It enables centralized logging for security monitoring, troubleshooting, and compliance.
XSOAR by Palo Alto NetworksPalo Alto Networks Cortex XSOAR is a security orchestration, automation, and response platform. It automates incident response workflows, integrates with security tools, and provides case management for SOC teams.
SaaS Password Rotation
Automated password rotation plugins for SaaS applications enabling KeeperPAM to rotate credentials for cloud services through APIs and admin interfaces.
Okta User Rotation by OktaOkta provides cloud-based identity and access management. KeeperPAM includes built-in support for automated Okta user password rotation through the Okta API.
Snowflake User Rotation by SnowflakeSnowflake is a cloud data platform providing data warehousing, data lakes, and data sharing capabilities. KeeperPAM includes built-in support for automated Snowflake user password rotation.
AWS Cognito Rotation by AmazonAWS Cognito provides user authentication, authorization, and user management for web and mobile applications. Supports user pools for sign-up/sign-in and identity pools for AWS resource access.
Cisco APIC Rotation by CiscoCisco Application Policy Infrastructure Controller (APIC) is the unified point of automation and management for Cisco ACI fabric. Provides centralized policy management and network provisioning.
Secrets Management
Platforms for securely storing, accessing, and rotating application secrets including API keys, tokens, certificates, and database credentials across infrastructure.
Hashicorp Vault by HashicorpHashiCorp Vault is a secrets management tool that securely stores and controls access to tokens, passwords, certificates, and API keys. It provides encryption as a service, dynamic secrets, and data protection across cloud and on-premises environments.
AWS Secrets Manager by AmazonAWS Secrets Manager helps protect access to applications, services, and IT resources by storing and managing secrets. It enables automatic rotation of database credentials, API keys, and other secrets.
Azure Key Vault by MicrosoftAzure Key Vault is a cloud service for securely storing and managing secrets, keys, and certificates. It provides hardware security module-backed storage and integrates with Azure services for encryption.
AWS KMS by AmazonAWS Key Management Service is a managed service for creating and controlling cryptographic keys. It integrates with AWS services to encrypt data and provides centralized control over key access and usage.
Entrust HSM by EntrustEntrust provides hardware security modules (HSMs) and key management solutions for cryptographic operations. Its nShield HSMs protect encryption keys and enable secure authentication for enterprises.
GCP Secret Manager by GoogleGoogle Cloud Secret Manager stores API keys, passwords, certificates, and other sensitive data. It provides versioning, access controls, and audit logging for secure secrets management in GCP.
Kubernetes External Secrets Operator by KubernetesKubernetes External Secrets Operator synchronizes secrets from external secret management systems into Kubernetes. It integrates with Vault, AWS Secrets Manager, and other providers to securely manage secrets in clusters.
Linux Keyring by LinuxLinux Keyring is a kernel security feature that stores cryptographic keys and passwords in kernel memory. Applications can securely store and retrieve secrets without exposing them in configuration files.
Teller by TellerTeller is an open-source secrets manager for developers that aggregates secrets from multiple providers. It enables secure handling of environment variables and secrets across Vault, AWS, and other sources.
Windows Credential Manager by MicrosoftWindows Credential Manager is a built-in Windows feature that stores login credentials for websites, applications, and network resources. It securely manages passwords and provides automatic sign-in capabilities.
Security Posture Management
Continuously assesses and monitors an organization’s security stance across cloud, applications, and infrastructure to identify vulnerabilities and misconfigurations.
Wiz by WizWiz provides a cloud security platform that delivers agentless visibility into cloud infrastructure across AWS, Azure, GCP, OCI, and Kubernetes. It identifies vulnerabilities, misconfigurations, exposed secrets, and malware, then uses attack path analysis to prioritize risks and enable security and development teams to collaborate on remediation.
Tenable by TenableTenable provides exposure management and risk-based vulnerability management solutions that deliver continuous asset discovery, vulnerability assessment, and prioritization across IT infrastructure, cloud environments, web applications, and operational technology. Uses AI-powered analytics and threat intelligence to identify and remediate critical exposures.
Saviynt by SavyintSaviynt provides a cloud-native identity governance platform that combines Identity Governance and Administration (IGA), Cloud Privileged Access Management, Application Access Governance, and Data Access Governance. Delivers intelligent identity analytics, risk-based access certification, and automated provisioning across hybrid environments.