Based on our record, CyberArk Conjur seems to be more popular. It has been mentiond 2 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
CyberArk (Conjur team) | Mid-Snr Infrastructure Engineer | REMOTE OR NEWTON, MA | FULL-TIME The Conjur infrastructure team provides support and internal tooling to the product engineers working on Conjur and Conjur Enterprise as well as a suite of associated products and integrations. Our job is to make sure engineering has the tools and facilities available to do their jobs with minimal infra-related effort on... - Source: Hacker News / almost 4 years ago
Conjur.org Conjur OSS Helm Chart Kubernetes Conjur Demo My GitHub repo with all the resources used in the post. - Source: dev.to / about 4 years ago
Qualys - Qualys helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications.
Imperva Data Security - Imperva is a leading provider of cyber security solutions that protect data and application assets, detect and prevent data breaches, protect against cyber-attacks and satisfy compliance requirements.
Trend Micro Deep Security - Excellent hybrid cloud security doesn't require your business to sacrifice operational performance. Trend Micro lets you keep business moving securely.
Oracle Advanced Security - Stop would-be attackers and reduce risk of unauthorized data exposure with advanced security database technologies from Oracle. Together, encryption and redaction form the foundation of defense-in-depth, multilayered database security solutions.
Snyk - Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.
Sophos Intercept X for Server - Sophos Intercept X for Server is an endpoint protection platform for businesses that combines the power and flexibility of a virtual sandbox to create a secure environment in which files can be scanned, monitored, and analyzed.