Save to My Lists
Claimed
Claimed

HashiCorp Vault Features

What are the features of HashiCorp Vault?

Usability & Access

  • Quick Login
  • Browser Extension
  • Multi-Device Use
  • Admin Management

Security Measures

  • Password Generator
  • Two-Factor Authentication
  • Security Audits

Storage

  • File Storage

Administration

  • Supported Databases
  • Data Management
  • Logging and Reporting
  • API / integrations

Governance

  • Compliance
  • Access Management

Protection

  • Audits

Top Rated HashiCorp Vault Alternatives

Filter for Features

Usability & Access

Quick Login

As reported in 18 HashiCorp Vault reviews. Expedites user logins using methods like a master password or password autofill.
84%
(Based on 18 reviews)

Browser Extension

As reported in 10 HashiCorp Vault reviews. Integrates the tool with your browser for easy use.
77%
(Based on 10 reviews)

Mobile App Usability

Integrates with your mobile device for use on mobile apps.

Not enough data

Multi-Device Use

Based on 10 HashiCorp Vault reviews. Enables user to use the tool across multiple devices.
87%
(Based on 10 reviews)

Admin Management

Allows an employer or administrator to manage employee access. 18 reviewers of HashiCorp Vault have provided feedback on this feature.
88%
(Based on 18 reviews)

Security Measures

Password Generator

As reported in 16 HashiCorp Vault reviews. Generates passwords for each of your logins.
97%
(Based on 16 reviews)

Two-Factor AuthenticationView full feature definition

See feature definition
Provides extra security by requiring an extra for of verification in addition to a password. This feature was mentioned in 14 HashiCorp Vault reviews.
93%
(Based on 14 reviews)

Security Audits

Analyzes and evaluates the quality and variety of your passwords. This feature was mentioned in 18 HashiCorp Vault reviews.
92%
(Based on 18 reviews)

Storage

Digital Wallet

Stores records like credit cards or receipts in addition to passwords.

Not enough data

File Storage

Stores files in addition to passwords. 10 reviewers of HashiCorp Vault have provided feedback on this feature.
93%
(Based on 10 reviews)

Encryption

Email Encryption

Encrypts the content of emails and their attachments.

Not enough data

Messaging Encryption

Encrypts messages being sent via text or within an application.

Not enough data

File Transfer Encryption

Protects data with within or as it leaves your secure or local network.

Not enough data

Data Encryption

Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

Not enough data

Document Encryption

Provides a level of encryption for text documents.

Not enough data

Full-Disk Encryption

Encrypts entire device to secure data in case it is lost or stolen.

Not enough data

Compliance

Authentication

Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging

Not enough data

Policy Enforcement

Abilities to set standards for database security and risk management.

Not enough data

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

Not enough data

Management

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data

Recovery

Decrypts datasets or files or allows users access to a backup database for reintegration.

Not enough data

File Management

Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.

Not enough data

Anomaly Detection

Monitors activity within networks and alerts administrators when unusual activity occurs.

Not enough data

Administration

Supported Databases

As reported in 14 HashiCorp Vault reviews. Supports different database platforms and data types. Typically integrates with a variety of existing databases.
89%
(Based on 14 reviews)

Data Management

As reported in 14 HashiCorp Vault reviews. Administrators can access and organize data related to incidents to produce reports or make data more navigable.
83%
(Based on 14 reviews)

Logging and Reporting

Based on 16 HashiCorp Vault reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
79%
(Based on 16 reviews)

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 15 reviewers of HashiCorp Vault have provided feedback on this feature.
87%
(Based on 15 reviews)

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Administration Console -

Provides a centralized console for administation tasks and unified control.

Not enough data

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Auditing

Documents access and alterations of the database for analytics and reporting.

Not enough data

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Management Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks.

Not enough data

Policy, User, and Role Management

Creates access requirements and standards and establishes user, roles, and access rights.

Not enough data

Approval Workflows

Allows administrators to approve or reject access changes to using defined workflows.

Not enough data

Automated Provisioning

Automates provisioning and deprovisioning to reduce the amount of administrative manual work.

Not enough data

Bulk Changes

Reduces manual administrative work.

Not enough data

Centralized Management

Manages identity information from on-premise and cloud applications.

Not enough data

Self-Service Access Requests

Automatically allows access if users meet policy requirements.

Not enough data

Governance

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 14 HashiCorp Vault reviews.
80%
(Based on 14 reviews)

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data. 14 reviewers of HashiCorp Vault have provided feedback on this feature.
85%
(Based on 14 reviews)

Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

Not enough data

Protection

Database Activity Monitoring

Based on 10 HashiCorp Vault reviews. Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point.
78%
(Based on 10 reviews)

Firewall

Protects database and sensitive information from a variety of attacks and malware threats.

Not enough data

Data Masking

Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.

Not enough data

Audits

Perform ad-hoc or ongoing IT audits at different levels of the company. 13 reviewers of HashiCorp Vault have provided feedback on this feature.
77%
(Based on 13 reviews)

Prevention

Intrusion Prevention

Enforces security paramaters to prevent unauthorized access.

Not enough data

Firewall

Protects servers, data center infrastructure and information from a variety of attacks and malware threats.

Not enough data

Encryption

Provide some level of encryption of information, protecting sensitive data while it exists within the data center.

Not enough data

Security hardening

Facilitates system and network security by identifying and remediating vulnerabilities

Not enough data

Cloud Data Protection

Provides high quality and wide scope of in-cloud and offline data security capabilities.

Not enough data

Detection

Intrusion Detection

Detects unauthorized access and use of privileged systems.

Not enough data

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Anti-Malware / Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Functionality

Durability

Logs and stores multiple copies and versions of master keys.

Not enough data

Envelope Encryption

Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK).

Not enough data

Automation

Allows administrative control over automated tasks related to key management, storage and distribution.

Not enough data

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.

Not enough data

Single Sign-On

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data

BYOD support

Enables users to bring-your-own-device to access company applications.

Not enough data

Password Vault

Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.

Not enough data

Centralized management

Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.

Not enough data

Role-based security

Allows privileges based on roles, such as business unit or other factors.

Not enough data

Live notifications

Configure which events will trigger a notification to prevent privileged access abuse in real-time.

Not enough data

Live session recording & playback

Offers live session recording and playback for compliance and auditing purposes.

Not enough data

Hide passwords

Offers the option to hide passwords when sharing with users, such as contract workers

Not enough data

Temporary, time-limited privilege

Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.

Not enough data

Audit trail

Creates audit trail of secrets lifecycle

Not enough data

Cental dashboard

Has a centralized dashboard for users to interact with

Not enough data

Universal approach

Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform

Not enough data

Availability

API/Integrations

Based on 10 HashiCorp Vault reviews. Integrates with third-party software to provide other features and expand functionality.
88%
(Based on 10 reviews)

Service Integration

Integrates with major cloud service provider offerings for simplified management and distribution.

Not enough data

Regional Support

Supports key distribution across multi-regions to increase availability.

Not enough data

Scalability

Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality.

Not enough data

Monitoring

Audit Logging

Provides audit logs for compliance reasons.

Not enough data

Activity Logging

Monitors, records, and logs both real-time and post-event activity.

Not enough data

Anomaly Detection

Detects abnormal user behavior to mitigate risks.

Not enough data

Reporting

Audit log

Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.

Not enough data

Reporting

Includes reporting functionality.

Not enough data