- Stars
- 33,551
- License
- Unknown
- Last commit
- 4 days ago
Best Secrets Management Tools
Explore leading tools in the Secrets Management category, including open-source options and SaaS products. Compare features, use cases, and find the best fit for your workflow.
7 open-source projects · 6 SaaS products
Top open-source Secrets Management
These projects are active, self-hostable choices for knowledge management teams evaluating alternatives to SaaS tools.
- Stars
- 23,808
- License
- Unknown
- Last commit
- 3 days ago
- Stars
- 20,076
- License
- MPL-2.0
- Last commit
- 4 days ago
- Stars
- 4,960
- License
- MPL-2.0
- Last commit
- 4 days ago
- Stars
- 3,154
- License
- Apache-2.0
- Last commit
- 1 year ago
- Stars
- 874
- License
- Unknown
- Last commit
- 15 days ago
Secure secrets management with encryption and access control
Centralize application secrets, API keys, and credentials across teams and infrastructure. Includes native integrations, secret rotation, dynamic secrets, internal PKI, and SSH certificate management.
Popular SaaS Platforms to Replace
Understand the commercial incumbents teams migrate from and how many open-source alternatives exist for each product.
Akeyless
Cloud-native SaaS platform for unified secrets management and machine identity security
AWS Secrets Manager
Managed service for securely storing, retrieving, and rotating application secrets (credentials, API keys, etc.)
Azure Key Vault
Cloud service for secure storage and management of cryptographic keys, secrets, and certificates
Doppler
Secrets manager and config sync for developers
Google Secret Manager
Managed storage and rotation for API keys and other secrets
HashiCorp Vault
Secrets management and encryption tool to securely store, access, and control sensitive credentials and keys
Akeyless is a fully managed, cloud-native secrets management platform that secures credentials, keys, and other secrets across hybrid and multi-cloud environments. It eliminates traditional vault infrastructure by providing a unified SaaS solution for managing and rotating secrets at scale, with strong encryption and access controls.
Frequently replaced when teams want private deployments and lower TCO.
Explore related categories
Browse neighbouring categories in Security to widen your evaluation.
- Application Security Testing (SAST/DAST/SCA)Static/dynamic analysis and dependency (SCA) scanning for application vulnerabilities.
- Compliance Automation & GRCAutomated controls, evidence collection and audits for SOC 2, ISO 27001, HIPAA and more.
- Container SecurityContainer image scanning and Kubernetes security tools for supply chain protection.
- Data Discovery & ClassificationSensitive data discovery, classification and privacy compliance across data stores.
- Identity & SSOIdentity and single sign-on (SSO) servers for authentication and user management.
- SIEM & Threat DetectionSecurity information and event management platforms for threat monitoring and analysis.





