What Integrates with Azure Key Vault?
Find out what Azure Key Vault integrations exist in 2026. Learn what software and services currently integrate with Azure Key Vault, and sort them by reviews, cost, features, and more. Below is a list of products that Azure Key Vault currently integrates with:
-
1
JSCAPE MFT Server
Redwood Software
188 RatingsPlatform Independent Managed File Transfer Server. JSCAPE is the ideal solution for government agencies and businesses looking to centralize their processes and provide seamless, secure and reliable file transfers. All compliance regulations, including SOX, PCI DSS and HIPAA, are met. To meet business challenges, centralize and control file transfers. You can deploy in the cloud, on site or in a hybrid cloud environment. Triggers can be used to automate business processes without the need for custom scripts. JSCAPE's iOS and Android file transfer clients allow you to exchange files. Integrate with Amazon and Google for regulatory compliance. Mobile user authentication for iOS and Android devices is easy and powerful. -
2
Securden Password Vault for Enterprises
Securden, Inc
55 RatingsSecurden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS). -
3
Microsoft Azure
Microsoft
20 RatingsMicrosoft Azure serves as a versatile cloud computing platform that facilitates swift and secure development, testing, and management of applications. With Azure, you can innovate purposefully, transforming your concepts into actionable solutions through access to over 100 services that enable you to build, deploy, and manage applications in various environments—be it in the cloud, on-premises, or at the edge—utilizing your preferred tools and frameworks. The continuous advancements from Microsoft empower your current development needs while also aligning with your future product aspirations. Committed to open-source principles and accommodating all programming languages and frameworks, Azure allows you the freedom to build in your desired manner and deploy wherever it suits you best. Whether you're operating on-premises, in the cloud, or at the edge, Azure is ready to adapt to your current setup. Additionally, it offers services tailored for hybrid cloud environments, enabling seamless integration and management. Security is a foundational aspect, reinforced by a team of experts and proactive compliance measures that are trusted by enterprises, governments, and startups alike. Ultimately, Azure represents a reliable cloud solution, backed by impressive performance metrics that validate its trustworthiness. This platform not only meets your needs today but also equips you for the evolving challenges of tomorrow. -
4
Remote Desktop Manager (RDM) consolidates over 50 remote connection types—like RDP (Remote Desktop Protocol), SSH (Secure Shell), and VPNs (Virtual Private Network)—into a single, secure interface. Teams can manage credentials, launch sessions, and monitor access with built-in role-based access control (RBAC) and logging. Add the Remote Connection & IT Management package to pair RDM with Gateway, Hub (SaaS) or Server (on-prem) for just-in-time access, centralized vaulting, and full session oversight.
-
5
Azure Blob Storage
Microsoft
$0.00099Azure Blob Storage offers a highly scalable and secure object storage solution tailored for a variety of applications, including cloud-native workloads, data lakes, high-performance computing, archives, and machine learning projects. It enables users to construct data lakes that facilitate analytics while also serving as a robust storage option for developing powerful mobile and cloud-native applications. With tiered storage options, users can effectively manage costs associated with long-term data retention while having the flexibility to scale up resources for intensive computing and machine learning tasks. Designed from the ground up, Blob storage meets the stringent requirements for scale, security, and availability that developers of mobile, web, and cloud-native applications demand. It serves as a foundational element for serverless architectures, such as Azure Functions, further enhancing its utility. Additionally, Blob storage is compatible with a wide range of popular development frameworks, including Java, .NET, Python, and Node.js, and it uniquely offers a premium SSD-based object storage tier, making it ideal for low-latency and interactive applications. This versatility allows developers to optimize their workflows and improve application performance across various platforms and environments. -
6
Microsoft Purview
Microsoft
$0.342Microsoft Purview serves as a comprehensive data governance platform that facilitates the management and oversight of your data across on-premises, multicloud, and software-as-a-service (SaaS) environments. With its capabilities in automated data discovery, sensitive data classification, and complete data lineage tracking, you can effortlessly develop a thorough and current representation of your data ecosystem. This empowers data users to access reliable and valuable data easily. The service provides automated identification of data lineage and classification across various sources, ensuring a cohesive view of your data assets and their interconnections for enhanced governance. Through semantic search, users can discover data using both business and technical terminology, providing insights into the location and flow of sensitive information within a hybrid data environment. By leveraging the Purview Data Map, you can lay the groundwork for effective data utilization and governance, while also automating and managing metadata from diverse sources. Additionally, it supports the classification of data using both predefined and custom classifiers, along with Microsoft Information Protection sensitivity labels, ensuring that your data governance framework is robust and adaptable. This combination of features positions Microsoft Purview as an essential tool for organizations seeking to optimize their data management strategies. -
7
QSE
QSE Group
$19.90/month QSE Group offers innovative quantum-proof data protection services designed to secure your data from evolving cyber threats, including potential risks posed by quantum computing. Their decentralized, immutable cloud storage ensures that your data remains safe from ransomware and other attacks, while their proprietary encryption technology remains future-proof. The platform’s Entropy as a Service (EaaS) provides quantum-resilient randomness for encryption key generation, ensuring data security both now and in the future. By integrating seamlessly into your existing infrastructure, QSE offers a simple yet robust solution for businesses seeking long-term protection without the need for major overhauls. The system is built to scale, offering flexibility from small business needs to enterprise-level demands. -
8
Azure Data Catalog
Microsoft
$1 per user per monthIn today’s data-driven landscape, the quest for data often consumes more time than the actual analysis itself. Azure Data Catalog serves as a comprehensive metadata repository designed to simplify the process of discovering data assets across the enterprise. This fully-managed service empowers users—from analysts to data scientists and developers—to register, enhance, locate, comprehend, and utilize various data sources effectively. You can engage with data using your preferred tools, as Data Catalog enables you to access the information you require and integrate it seamlessly into your workflows. Your data remains where you prefer, while Data Catalog facilitates the exploration and utilization of that data in a user-friendly manner. By promoting widespread adoption and fostering ongoing value creation within your data ecosystem, Data Catalog provides useful insights, practical tips, and unwritten guidelines within a shared platform that benefits all users. With this tool, contributions from everyone are encouraged, leading to a democratization of data asset discovery that enhances collaborative efforts. This collective engagement ultimately transforms how organizations leverage data, paving the way for innovation and efficiency. -
9
F5 NGINXaaS for Azure
F5
$0.015 per ncu per hourNGINX as a Service (NGINXaaS) on Azure is a comprehensive managed solution that seamlessly merges the advanced traffic services of NGINX with the Microsoft Azure environment. It allows for easy migration, extension, or relocation of current NGINX workloads to the cloud, significantly aiding organizations in reducing costs while enhancing flexibility and ensuring consistent security and performance across both on-premises and Azure cloud applications. This service empowers application developers to deploy uniform applications directly from the Azure Marketplace, requiring only a few simple clicks within the console. Users can conveniently deploy and oversee NGINXaaS through the Azure Portal, which features essential integrations like Azure Monitor and Azure Key Vault to facilitate SSL/TLS certificate management. With a smooth lift-and-shift process for existing NGINX configurations, organizations can transition or enhance their workloads in the cloud efficiently and effortlessly, fostering innovation and agility in their operations. By leveraging this service, companies can better focus on their core business objectives while ensuring their applications perform optimally in a cloud environment. -
10
CertPing
CertPing
$1.99 per monthCertPing serves as a comprehensive platform for observability and security, leveraging artificial intelligence to assist organizations in safeguarding their online assets by relentlessly tracking website availability and response times. It automates the management of SSL/TLS certificates, including their issuance, rotation, and deployment, while also identifying brand impersonation threats such as phishing attempts, typosquatting, and similar-looking domains. This innovative solution integrates uptime monitoring, SSL health insights, incident communications through public status pages, and threat intelligence into a singular dashboard that showcases real-time metrics, historical data, and alerts, empowering teams to swiftly address any outages or security issues. Moreover, CertPing’s proactive brand defense features continuously monitor for unauthorized domain registrations and phishing attempts that could jeopardize user trust. In addition to its monitoring capabilities, CertPing also offers workflows for trademark protection and provides support for legal filings by collaborating with trusted partners, ensuring a comprehensive approach to online security and brand integrity. -
11
Protegrity
Protegrity
Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods. -
12
Doppler
Doppler
$6 per seat per monthStop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy! -
13
Azure DevTest Labs
Microsoft
Rapidly establish development and testing environments while effectively reducing waste through the implementation of quotas and policies. Implement automated shutdowns to keep costs low and create environments for both Windows and Linux systems. Offer self-service cloud solutions that eliminate concerns about management, as lab policies and thresholds seamlessly contribute to cost reduction. Set up your virtual machine equipped with essential development tools and the latest build in just a few clicks, enabling your team to share reusable templates effortlessly. Directly generate environments from your continuous integration (CI) tools by utilizing our plug-ins, REST API, or the Visual Studio Team Services extension. Configure lab policies to automatically manage the start-up and shutdown of virtual machines, ensuring operational efficiency. Establish limits for your lab, such as the maximum number of virtual machines allowed per user and per lab, to maintain control. Analyze lab cost trends to forecast your expenditures and define a spending threshold for better budget management. Employ our REST API to provision development and testing environments directly from continuous integration (CI) tools, allowing for an integrated workflow. In addition, you can swiftly deploy from your release pipeline using our Team Services tasks extension, ensuring a streamlined and efficient process. This comprehensive approach not only enhances productivity but also fosters collaboration across your development teams. -
14
Jovu
Amplication
Seamlessly create new services and enhance your current applications using Amplication AI. Transform your concepts into operational systems in just four minutes. This AI-powered tool generates code that is ready for production, ensuring uniformity, reliability, and compliance with top-tier standards. Experience a swift transition from idea to implementation, with scalable code that is ready for deployment in minutes. Amplication AI goes beyond mere prototypes, providing fully functional and resilient backend services that are primed for launch. It streamlines your development processes, minimizes time spent, and maximizes your resources. Harness the capabilities of AI to achieve more with your existing assets. Simply enter your specifications and observe as Jovu converts them into immediately usable code components. It produces production-ready data models, APIs, authentication, authorization, event-driven architectures, and all necessary elements to get your service operational. You can also integrate architecture components and extend functionalities using the various Amplication plugins available. This allows for greater customization and adaptability in your development projects. -
15
Centreon
Centreon
Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure. -
16
Privacera
Privacera
Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system. -
17
Keyfactor Command for IoT
Keyfactor
Keyfactor Command for IoT is an end-to-end identity management solution that ensures the security and compliance of connected devices. By automating the process of provisioning, managing, and revoking device certificates, the platform helps businesses secure IoT devices throughout their entire lifecycle. With support for over-the-air provisioning and real-time visibility into device identity statuses, businesses can easily track and monitor their IoT deployments. Whether for automotive, medical devices, or industrial IoT, Keyfactor Command for IoT provides the tools needed to maintain a trusted, scalable IoT infrastructure. It integrates seamlessly with major IoT platforms, enhancing security with features like automated certificate renewal, revocation, and crypto-agility. This ensures that IoT systems remain secure, adaptable, and compliant with industry standards. -
18
Azure Blockchain Workbench
Microsoft
Streamline the development process and facilitate experimentation through readily available networks and infrastructure. Speed up the realization of benefits via integrations and extensions with cloud services and applications. Innovate confidently on a platform that is open, reliable, and accessible worldwide. Azure Blockchain Workbench enables users to set up and launch a consortium network effortlessly with just a few clicks. Particularly suited for development and testing, Blockchain Workbench's automatic ledger setup, network creation, and preconfigured blockchain commands significantly cut down on the time required for infrastructure development. Additionally, it minimizes both the time and expenses associated with development by providing ready-made integrations with essential cloud services for application creation. Enhance the ease of sign-in and collaboration by linking blockchain identities to Azure Active Directory. Ensure the secure storage of private keys using Azure Key Vault, while also facilitating the ingestion of messages and events necessary for activating your smart contracts through Service Bus and Event Hubs. By leveraging these tools, organizations can maximize their blockchain development potential while maintaining security and efficiency. -
19
CertSecure Manager
Encryption Consulting LLC
A single solution for certificate management, which helps automate and manage all certificates across Cloud Environments, On Premises, Hybrid IT Environments, and Kubernetes Clusters. It manages certificates throughout their entire lifecycle, including certificate issuance and monitoring, renewal, and revocation. -
20
ContraForce
ContraForce
Utilize ContraForce to streamline investigation workflows across multiple tenants, automate the remediation of security incidents, and provide outstanding managed security services. Achieve cost-effectiveness through scalable pricing while ensuring high performance tailored to your operational requirements. Enhance the speed and scale of your current Microsoft security infrastructure with effective workflows, integrated security engineering tools, and advanced multi-tenancy features. Benefit from response automation that adjusts to the context of your business, offering comprehensive protection for your clients from endpoints to the cloud, all without the need for scripting, agents, or coding. Centrally manage various Microsoft Defender and Sentinel customer accounts, along with incidents and cases from other XDR, SIEM, and ticketing systems. Experience a consolidated investigation platform where all your security alerts and data are accessible in one place. With ContraForce, you can seamlessly conduct threat detection, investigations, and response workflows in a unified environment, enhancing the overall efficiency and effectiveness of your security operations. -
21
The Unified Key Orchestrator for IBM z/OS, previously known as IBM Enterprise Key Management Foundation-Web Edition, serves as a comprehensive key management solution that efficiently coordinates and safeguards the lifecycle of encryption keys throughout your organization, adaptable for both on-premises and various cloud platforms such as IBM Cloud, AWS KMS, Azure Key Vault, and Google Cloud. This tool, UKO for z/OS, facilitates the management and transition of key management tasks within and between on-premises setups and cloud environments, thereby enhancing compliance and bolstering security measures. By utilizing UKO for z/OS, organizations can control their encryption keys through a single, reliable user interface, streamlining operations. As a z/OS software deployment, UKO for z/OS allows for seamless key orchestration across all IBM z/OS systems as well as multiple public cloud services. Additionally, it provides support for key management associated with zKey on Linux® on IBM Z and integrates with the IBM Security Guardium key lifecycle manager, ensuring comprehensive coverage across various platforms. This multifaceted approach to key management ultimately reinforces the security framework of your enterprise and simplifies the complexities associated with encryption key handling.
-
22
Salesforce Data 360
Salesforce
Salesforce Data 360 is a real-time enterprise data engine designed to transform disconnected data into actionable intelligence. It unifies customer and operational data from multiple systems into a comprehensive business view. Using Zero-Copy architecture, organizations can activate live data directly from their existing warehouses without duplication. The platform supports both structured and unstructured data, including text, images, and streaming events. Identity resolution and data harmonization tools create consistent, reliable customer profiles. Governance features enforce privacy policies and compliance rules automatically. Data 360 enables dynamic audience segmentation and predictive modeling for smarter decision-making. Teams can trigger automated workflows based on real-time data changes. Insights can be shared securely with marketing platforms, analytics tools, and data warehouses. Data 360 empowers enterprises to activate trusted data across every channel and department. -
23
Azure Marketplace
Microsoft
The Azure Marketplace serves as an extensive digital storefront, granting users access to a vast array of certified, ready-to-use software applications, services, and solutions provided by both Microsoft and various third-party vendors. This platform allows businesses to easily explore, purchase, and implement software solutions directly within the Azure cloud ecosystem. It features a diverse selection of products, encompassing virtual machine images, AI and machine learning models, developer tools, security features, and applications tailored for specific industries. With various pricing structures, including pay-as-you-go, free trials, and subscriptions, Azure Marketplace makes the procurement process more straightforward and consolidates billing into a single Azure invoice. Furthermore, its seamless integration with Azure services empowers organizations to bolster their cloud infrastructure, streamline operational workflows, and accelerate their digital transformation goals effectively. As a result, businesses can leverage cutting-edge technology solutions to stay competitive in an ever-evolving market. -
24
Keycard
Keycard
Keycard is an advanced identity and access management platform tailored for the era of agent-driven technology, facilitating secure connections among AI agents, users, services, and APIs through real-time identity controls driven by policies. Instead of relying on static secrets, it generates dynamic, short-lived access tokens and accommodates federated identity systems to unify users, agents, and workloads within a decentralized authorization structure. Developers can leverage convenient SDKs compatible with popular frameworks, enabling them to create applications aware of agents without needing extensive IAM knowledge. The platform’s data architecture encompasses identity-validated agents, tasks, tools, and resources, which facilitate the establishment of logical zones equipped with permissions that are context-aware and subject to auditing. Additionally, security teams have the capability to formulate deterministic, task-oriented policies that clarify who (whether a user or agent) is permitted to perform certain tasks on specific resources under designated conditions, ensuring complete transparency in access control. This comprehensive approach not only enhances security but also improves operational efficiency across various systems. -
25
Azure Confidential Computing
Microsoft
Azure Confidential Computing enhances the privacy and security of data by safeguarding it during processing, rather than merely when it is stored or transmitted. It achieves this by encrypting data in memory through hardware-based trusted execution environments, enabling computations to occur only after the cloud platform has authenticated the environment. This method effectively blocks access from cloud service providers, administrators, and other privileged users. Additionally, it facilitates scenarios like multi-party analytics, where various organizations can collaboratively use encrypted datasets for joint machine learning efforts without disclosing their respective data. Users maintain complete control over their data and code, dictating which hardware and software can access them, and they can transition existing workloads using familiar tools, SDKs, and cloud infrastructures. Ultimately, this approach not only fosters collaboration but also significantly bolsters trust in cloud computing environments.
- Previous
- You're on page 1
- Next