Quick Login | As reported in 18 HashiCorp Vault reviews. Expedites user logins using methods like a master password or password autofill. | 84% (Based on 18 reviews) | |
Browser Extension | As reported in 10 HashiCorp Vault reviews. Integrates the tool with your browser for easy use. | 77% (Based on 10 reviews) | |
Mobile App Usability | Integrates with your mobile device for use on mobile apps. | Not enough data | |
Multi-Device Use | Based on 10 HashiCorp Vault reviews. Enables user to use the tool across multiple devices. | 87% (Based on 10 reviews) | |
Admin Management | Allows an employer or administrator to manage employee access. 18 reviewers of HashiCorp Vault have provided feedback on this feature. | 88% (Based on 18 reviews) |
Password Generator | As reported in 16 HashiCorp Vault reviews. Generates passwords for each of your logins. | 97% (Based on 16 reviews) | |
Two-Factor Authentication | See feature definition | Provides extra security by requiring an extra for of verification in addition to a password. This feature was mentioned in 14 HashiCorp Vault reviews. | 93% (Based on 14 reviews) |
Security Audits | Analyzes and evaluates the quality and variety of your passwords. This feature was mentioned in 18 HashiCorp Vault reviews. | 92% (Based on 18 reviews) |
Digital Wallet | Stores records like credit cards or receipts in addition to passwords. | Not enough data | |
File Storage | Stores files in addition to passwords. 10 reviewers of HashiCorp Vault have provided feedback on this feature. | 93% (Based on 10 reviews) |
Email Encryption | Encrypts the content of emails and their attachments. | Not enough data | |
Messaging Encryption | Encrypts messages being sent via text or within an application. | Not enough data | |
File Transfer Encryption | Protects data with within or as it leaves your secure or local network. | Not enough data | |
Data Encryption | Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application. | Not enough data | |
Document Encryption | Provides a level of encryption for text documents. | Not enough data | |
Full-Disk Encryption | Encrypts entire device to secure data in case it is lost or stolen. | Not enough data |
Authentication | Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging | Not enough data | |
Policy Enforcement | Abilities to set standards for database security and risk management. | Not enough data | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data |
Backup | Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster. | Not enough data | |
Recovery | Decrypts datasets or files or allows users access to a backup database for reintegration. | Not enough data | |
File Management | Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt. | Not enough data | |
Anomaly Detection | Monitors activity within networks and alerts administrators when unusual activity occurs. | Not enough data |
Supported Databases | As reported in 14 HashiCorp Vault reviews. Supports different database platforms and data types. Typically integrates with a variety of existing databases. | 89% (Based on 14 reviews) | |
Data Management | As reported in 14 HashiCorp Vault reviews. Administrators can access and organize data related to incidents to produce reports or make data more navigable. | 83% (Based on 14 reviews) | |
Logging and Reporting | Based on 16 HashiCorp Vault reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | 79% (Based on 16 reviews) | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 15 reviewers of HashiCorp Vault have provided feedback on this feature. | 87% (Based on 15 reviews) | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Administration Console - | Provides a centralized console for administation tasks and unified control. | Not enough data | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Auditing | Documents access and alterations of the database for analytics and reporting. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Management Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks. | Not enough data | |
Policy, User, and Role Management | Creates access requirements and standards and establishes user, roles, and access rights. | Not enough data | |
Approval Workflows | Allows administrators to approve or reject access changes to using defined workflows. | Not enough data | |
Automated Provisioning | Automates provisioning and deprovisioning to reduce the amount of administrative manual work. | Not enough data | |
Bulk Changes | Reduces manual administrative work. | Not enough data | |
Centralized Management | Manages identity information from on-premise and cloud applications. | Not enough data | |
Self-Service Access Requests | Automatically allows access if users meet policy requirements. | Not enough data |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 14 HashiCorp Vault reviews. | 80% (Based on 14 reviews) | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. 14 reviewers of HashiCorp Vault have provided feedback on this feature. | 85% (Based on 14 reviews) | |
Multi-Factor Authentication | Requires a second level of authentication, such as sms messaging or customized tokens, to access data. | Not enough data |
Database Activity Monitoring | Based on 10 HashiCorp Vault reviews. Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point. | 78% (Based on 10 reviews) | |
Firewall | Protects database and sensitive information from a variety of attacks and malware threats. | Not enough data | |
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | Not enough data | |
Audits | Perform ad-hoc or ongoing IT audits at different levels of the company. 13 reviewers of HashiCorp Vault have provided feedback on this feature. | 77% (Based on 13 reviews) |
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. | Not enough data | |
Firewall | Protects servers, data center infrastructure and information from a variety of attacks and malware threats. | Not enough data | |
Encryption | Provide some level of encryption of information, protecting sensitive data while it exists within the data center. | Not enough data | |
Security hardening | Facilitates system and network security by identifying and remediating vulnerabilities | Not enough data | |
Cloud Data Protection | Provides high quality and wide scope of in-cloud and offline data security capabilities. | Not enough data |
Intrusion Detection | Detects unauthorized access and use of privileged systems. | Not enough data | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Anti-Malware / Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data |
Durability | Logs and stores multiple copies and versions of master keys. | Not enough data | |
Envelope Encryption | Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK). | Not enough data | |
Automation | Allows administrative control over automated tasks related to key management, storage and distribution. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. | Not enough data | |
Single Sign-On | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
BYOD support | Enables users to bring-your-own-device to access company applications. | Not enough data | |
Password Vault | Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users. | Not enough data | |
Centralized management | Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected. | Not enough data | |
Role-based security | Allows privileges based on roles, such as business unit or other factors. | Not enough data | |
Live notifications | Configure which events will trigger a notification to prevent privileged access abuse in real-time. | Not enough data | |
Live session recording & playback | Offers live session recording and playback for compliance and auditing purposes. | Not enough data | |
Hide passwords | Offers the option to hide passwords when sharing with users, such as contract workers | Not enough data | |
Temporary, time-limited privilege | Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. | Not enough data | |
Audit trail | Creates audit trail of secrets lifecycle | Not enough data | |
Cental dashboard | Has a centralized dashboard for users to interact with | Not enough data | |
Universal approach | Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform | Not enough data |
API/Integrations | Based on 10 HashiCorp Vault reviews. Integrates with third-party software to provide other features and expand functionality. | 88% (Based on 10 reviews) | |
Service Integration | Integrates with major cloud service provider offerings for simplified management and distribution. | Not enough data | |
Regional Support | Supports key distribution across multi-regions to increase availability. | Not enough data | |
Scalability | Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality. | Not enough data |
Audit Logging | Provides audit logs for compliance reasons. | Not enough data | |
Activity Logging | Monitors, records, and logs both real-time and post-event activity. | Not enough data | |
Anomaly Detection | Detects abnormal user behavior to mitigate risks. | Not enough data |
Audit log | Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. | Not enough data | |
Reporting | Includes reporting functionality. | Not enough data |