"This is a cloud-based application, which makes it very easy to deploy."
"It can still be configured by a separate team other than developers. That's why I think it's more secure."
"The solution is stable. It has been working perfectly without any problem."
"The interface is very simple to navigate."
"This solution is easy to use and to integrate."
"The most valuable feature of HashiCorp Vault is that it's an open source solution. Second, it's cloud agnostic, so it's very easy to maintain and control, which is why we prefer HashiCorp."
"This solution needs better integration with third-party solutions because their ability to support other tools is very weak."
"The technical support was hard to get a hold of and lacking in service."
"The documentation is very general; it should have more examples and more use cases."
"We could use more documentation, primarily to do with integrations."
"I don't think there are any major improvements required—so far, so good. However, I think that having more training materials, such as videos, and documentation available would be helpful. I would prefer to have more videos available either on the official site or on YouTube."
"The solution could be much easier to implement."
Centrify Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.
Access across organizational boundaries Privilege Service enables you to authenticate your IT users through Active Directory, LDAP Centrify Cloud Directory, or Google G Suite
Directory. You can use one or any combination of these identity stores to grant granular access to employees, business partners and outside vendors.
Grant access to specific resources Unlike a VPN, Privilege Service enables you to grant access to
resources on a on a per-resource basis. This means that you can easily give your internal IT admins access to as much of your infrastructure as necessary, while limiting access by an outsourced
team to only the servers and network hardware their business role or IT function requires.
Access from any location Your IT admins can log in and securely access resources from any location that can reach the Privilege Service. For user logins outside the corporate network, you can require Centrify’s built-in multi-factor authentication for security stronger than a user name and password.
Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, or certificates. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
Centrify Privileged Access Service is ranked 14th in Enterprise Password Managers with 1 review while HashiCorp Vault is ranked 4th in Enterprise Password Managers with 5 reviews. Centrify Privileged Access Service is rated 6.0, while HashiCorp Vault is rated 7.6. The top reviewer of Centrify Privileged Access Service writes "Straightforward to set up and easy to deploy but it needs support for software-defined infrastructure". On the other hand, the top reviewer of HashiCorp Vault writes "Easy to use and integrate, but the documentation needs to be updated and improved". Centrify Privileged Access Service is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, BeyondTrust Endpoint Privilege Management, CyberArk Enterprise Password Vault and Microsoft Azure Key Vault, whereas HashiCorp Vault is most compared with Microsoft Azure Key Vault, CyberArk Enterprise Password Vault, AWS Secrets Manager, Thycotic Secret Server and ManageEngine Password Manager Pro.
See our list of best Enterprise Password Managers vendors.
We monitor all Enterprise Password Managers reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.