Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!

Description

Utilize encryption keys to safeguard your secrets, personal details, and sensitive information stored in the cloud. You can create and remove keys, configure access policies, and execute key rotation through the management console, CLI, or API. Yandex KMS supports both symmetric and asymmetric cryptographic methods. With the REST or RPC API, you can encrypt and decrypt small data sets, including secrets and local encryption keys, in addition to signing data through electronic signature protocols. You have control over who can access the encrypted information, while Yandex KMS guarantees the security and durability of the keys. Additionally, Hardware Security Modules (HSMs) are provided for enhanced security. For small data encryption, you can use the SDKs available in Java or Go, while larger data sets can be encrypted using popular libraries like the AWS Encryption SDK and Google Tink. The service integrates seamlessly with Yandex Lockbox, allowing you to encrypt secrets with your own keys. Furthermore, encryption keys can also be employed to secure secrets and data within the Managed Service for Kubernetes, providing robust protection across various platforms. This comprehensive approach ensures that your sensitive information remains secure from unauthorized access.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Kubernetes
AWS Lambda
AWS Secrets Manager
Amazon Web Services (AWS)
Bitbucket
CircleCI
Compyl
Dealer-FX
Docker
GitHub
GitLab
Google Cloud Platform
Heroku
KonnectzIT
MailerQ
Oneleet
Quickwork
Serverless360
Terraform
Yandex Lockbox

Integrations

Kubernetes
AWS Lambda
AWS Secrets Manager
Amazon Web Services (AWS)
Bitbucket
CircleCI
Compyl
Dealer-FX
Docker
GitHub
GitLab
Google Cloud Platform
Heroku
KonnectzIT
MailerQ
Oneleet
Quickwork
Serverless360
Terraform
Yandex Lockbox

Pricing Details

$6 per seat per month
Free Trial
Free Version

Pricing Details

$0.0230 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Doppler

Founded

2018

Country

United States

Website

www.doppler.com

Vendor Details

Company Name

Yandex

Founded

1997

Country

Russia

Website

cloud.yandex.com/en/services/kms

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

Alternatives

Azure Key Vault Reviews

Azure Key Vault

Microsoft
HashiCorp Vault Reviews

HashiCorp Vault

HashiCorp
Ubiq Reviews

Ubiq

Ubiq Security
HashiCorp Vault Reviews

HashiCorp Vault

HashiCorp