Germany verdict (TL;DR)
Verified 2026-05-19Germany's secrets management market is dominated by HashiCorp Vault at DAX 40 and large German enterprises, with AWS Secrets Manager standard at German SaaS on AWS Frankfurt. Akeyless has gained meaningful DACH traction at German enterprises seeking vault-less architecture aligned with BSI zero-trust guidance. CyberArk Conjur has strong DACH presence at large manufacturing, automotive, and financial organizations already running CyberArk PAM. There is no credible German-built secrets management product. DSGVO, BSI IT-Grundschutz ORP.4, KRITIS IT-Sicherheitsgesetz 2.0, and BaFin BAIT/VAIT create layered credential security requirements. Betriebsrat (works council) co-determination under BetrVG §87 applies to secrets access monitoring features.
Picks for Germany
- German DAX 40 and large enterprise secrets backbone (KRITIS, BAIT/VAIT): hashicorp-vault-secrets Dominant German enterprise secrets platform. AWS Frankfurt (eu-central-1) and Azure Germany West Central data residency satisfies DSGVO. BSI IT-Grundschutz ORP.4 control mapping available from DACH integrators. BaFin BAIT/VAIT alignment documented.
- German enterprise with vault-less zero-trust architecture (DAX 40 and KRITIS): akeyless Akeyless DFC architecture resonates with BSI zero-trust guidance and German on-prem control preference. AWS Frankfurt hosted. DSGVO-compliant. Growing at DAX 40 and German financial services organizations evaluating Vault alternatives.
- German AWS-first SaaS and technology companies: aws-secrets-manager Native AWS Frankfurt (eu-central-1) deployment. BSI C5:2020 via AWS Frankfurt infrastructure attestation. DSGVO data residency inherent. Used by German tech (SAP-adjacent SaaS, Celonis-tier) on AWS.
- German enterprises with CyberArk PAM (automotive, manufacturing, banking): cyberark-conjur CyberArk has a Munich office and strong DACH PAM presence at BMW, Siemens, Deutsche Bank-tier. Conjur is the natural machine-secrets extension for these organizations. Azure Germany West Central data residency available.
- German DevOps-first engineering teams (Mittelstand and Berlin tech): doppler Growing in German engineering-led product companies and Berlin-based startups. EUR billing. AWS Frankfurt deployment for DSGVO compliance. Best developer ergonomics for German teams evaluating Vault alternatives.
How the secrets management software market looks in Germany
Germany's secrets management market has several structural characteristics not present in the US, UK, or France. First, the BSI (Bundesamt fur Sicherheit in der Informationstechnik) framework explicitly covers credential and secrets management. IT-Grundschutz ORP.4 (identity and access management) requires organizations to manage privileged and service account credentials securely, with audit logging and access reviews. BSI's KRITIS minimum standards (updated 2023) include credential management as a required control for operators in energy, water, banking, transport, and digital infrastructure.
Second, BaFin BAIT (for banks), VAIT (for insurers), and KAIT (for capital management companies) require credential governance for regulated financial institutions. BaFin has cited inadequate machine credential management in IT audit findings at German banks, which has accelerated Vault and Conjur adoption at German FSI.
Third, Akeyless has established a meaningful DACH presence that is unusual for a non-US, non-European vendor. The Akeyless vault-less architecture (Distributed Fragments Cryptography, where the vendor never holds complete encryption keys) resonates with the German enterprise preference for not surrendering complete cryptographic control to a vendor. This is the same instinct that drives German on-prem preferences generally, and Akeyless has positioned effectively against it.
Fourth, Betriebsrat co-determination (BetrVG §87 No. 6) applies to secrets management systems that monitor employee behavior, including audit logs that record which employee account accessed which secret. As with PAM session recording, German enterprises should negotiate a Betriebsvereinbarung covering secrets access log retention, access to logs, and employee notification before full deployment. This adds 3-12 months to German rollouts.
There is no credible German-built secrets management product. The gap is real but buyers should not expect a German local champion in the near term.
DSGVO (BDSG): secrets management audit logs containing personal data of German employees (employee ID linked to credential access events) require DSGVO-compliant data processing agreements, EU data residency, and defined retention periods; AWS Frankfurt (eu-central-1) and Azure Germany West Central are the standard regions. BSI IT-Grundschutz ORP.4: Baustein ORP.4 (identity and access management) covers privileged account credential management, access reviews, and audit logging; the reference for Bundesbehorden and KRITIS-adjacent organizations. BSI C5:2020: cloud secrets management must demonstrate or reference C5 infrastructure attestation (AWS Frankfurt, Azure Germany, GCP Frankfurt all hold C5). IT-Sicherheitsgesetz 2.0 (KRITIS): KRITIS operators must implement secure credential management per BSI minimum security standards; secrets management is a required control. BaFin BAIT/VAIT/KAIT: regulated German financial firms must maintain secure management of application credentials and API keys with audit trails; Vault, Conjur, and Akeyless all produce BaFin-aligned control mapping. BetrVG §87 No. 6: secrets access monitoring features require Betriebsrat co-determination; negotiate Betriebsvereinbarung before deploying audit logging that records employee-identifiable access events. GAIA-X: German and EU sovereignty cloud initiative; secrets management on GAIA-X-compliant infrastructure (AWS Frankfurt EUCS-aligned, Azure Germany West Central, OVHcloud EU) is the direction for German public-sector and critical infrastructure procurement.
Quick comparison, ranked for Germany
| Product | Best for | Starts at | 10-emp/mo* | Pricing | G2 | Geo |
|---|---|---|---|---|---|---|
| 1 HashiCorp Vault | Regulated enterprises and platform teams with operational expertise | $0 | $0 | 4.7 | Global; strongest in US, EU, APAC | |
| 5 Akeyless Vault Platform | Regulated enterprises and vault-less SaaS buyers | $0 | $0 | 4.7 | Global; strongest in US, EU, Israel | |
| 4 AWS Secrets Manager | AWS-anchored estates of any size | $0 | $0 | 4.5 | Global (AWS regions) | |
| 8 CyberArk Conjur | CyberArk-anchored regulated enterprises | $0 | $0 | 4.3 | Global; strongest in US, EU, Israel, APAC | |
| 2 Doppler | Engineering-led cloud-native teams | $0 | $0 | 4.7 | Global; strongest in US, EU | |
| 7 Infisical | Engineering-led teams adopting open-source modern secrets | $0 | $0 | 4.8 | Global; strongest in US, EU, India | |
| 3 1Password Secrets Automation | Mid-market and enterprise 1Password Business shops | $8/emp | $80 | 4.7 | Global; strongest in US, EU, Canada | |
| 6 Bitwarden Secrets Manager | Mid-market and lower-enterprise buyers already on Bitwarden Password Manager | $6/emp | $60 | 4.6 | Global; strongest in US, EU | |
| 9 Delinea Secret Server (DevOps Secrets Vault) | Mid-market and lower-enterprise Delinea/Thycotic-anchored estates | Quote | - | 4.5 | Global; strongest in US, EU, APAC | |
| 10 GitGuardian Platform | Security-led organizations buying detection and management together | $0 | $0 | 4.7 | Global; strongest in EU, US |
*10-employee monthly cost = base fee + (per-employee × 10) using the lowest published tier. For opaque-pricing vendors, no value is shown.
What buyers in Germany actually pay
Median annual deal size by employee band, in EUR. Crowdsourced from anonymized buyer disclosures.
| Product | Employee band | Median annual (EUR) | Sample | Notes |
|---|---|---|---|---|
| HashiCorp Vault | Vault Enterprise, 200-2,000 engineers (DAX/KRITIS) | €46,000 | 44 | HCP Vault or self-managed; EUR via DACH reseller; AWS Frankfurt hosted |
| Akeyless Vault Platform | 200-2,000 engineers (DAX 40/FSI) | €38,000 | 31 | SaaS Enterprise; EUR billing; AWS Frankfurt data residency |
| AWS Secrets Manager | 1,000-10,000 secrets (German SaaS) | €6,800 | 84 | AWS eu-central-1 Frankfurt; EUR billing; per-secret pricing; BSI C5 inherited |
| CyberArk Conjur | 500-5,000 engineers (automotive/banking) | €68,000 | 27 | Conjur Enterprise; EUR via CyberArk Germany Munich; Azure Germany West Central option |
| Doppler | 50-500 engineers (Mittelstand/Berlin tech) | €13,000 | 41 | Enterprise plan; EUR equivalent; AWS Frankfurt hosted for DSGVO |
Germany-built or Germany-strong vendors worth knowing
Not yet ranked in our global top 10, but credible options for Germany buyers and worth a shortlist.
MTRIX (PAM-adjacent)
Visit ↗Hannover-based German PAM specialist. MTRIX does not offer a standalone secrets management product but is relevant as a German-native privileged access management vendor for organizations wanting a German-headquartered vendor relationship alongside their secrets management platform.
Hallo (German open-source adjacent)
Visit ↗No credible German-built standalone secrets management product has achieved meaningful enterprise market presence as of mid-2026. German buyers should evaluate the global field with AWS Frankfurt and Azure Germany West Central as the data-residency anchors.
All 10, ranked for Germany
Same intelligence as the global ranking, vendor trust, review patterns, verified pricing, compliance, reordered for the Germany market.
HashiCorp Vault
De facto enterprise secrets backbone, now an IBM business with BSL license baggage.
HashiCorp Vault is the most deployed enterprise secrets management platform, founded 2012 and the de facto open-source standard for secrets, PKI, and dynamic credentials through 2023. The Aug 2023 license switch from MPL to Business Source License (BSL) sparked an immediate community backlash, prompting the OpenTofu fork (Terraform) and the OpenBao fork (Vault) under Linux Foundation governance. IBM closed its acquisition of HashiCorp on Feb 27, 2025 for about $6.4B, and post-IBM product strategy is still being clarified through 2026: integration with IBM Cloud and Red Hat is the stated direction, but enterprise customers report a wait-and-see posture on roadmap velocity. Vault remains the broadest and deepest commercial secrets platform; the buying question is whether you trust the post-IBM trajectory and the BSL terms.
Regulated enterprises (1,000-50,000+ employees) needing the deepest secrets, PKI, and dynamic-credentials platform, with budget for operational expertise.
Greenfield engineering teams wanting modern developer ergonomics (Doppler or Infisical win), or organizations philosophically opposed to BSL licensing (OpenBao or pure-OSS alternatives).
Strengths
- Deepest feature set in the category (KV, dynamic credentials, PKI, transit, transform, database secrets engines)
- Largest community and integration ecosystem of any secrets platform
- Strong dynamic-credentials story across AWS, Azure, GCP, databases, Kubernetes
- Vault Enterprise adds performance replication, DR, HSM auto-unseal, namespaces
- Mature Kubernetes integration via Vault Agent and Secrets Operator
- Auditor-grade evidence trails for regulated industries
Weaknesses
- Aug 2023 BSL license switch fractured open-source community trust
- OpenBao fork exists as an OSS-compatible alternative and is gaining adoption
- Feb 2025 IBM close leaves post-acquisition product strategy unclarified
- Enterprise pricing opaque; deal sizes routinely larger than initial scoping suggested
- Operational complexity is real (storage, unsealing, replication, namespaces all need expertise)
- Developer ergonomics weaker than Doppler or Infisical for greenfield teams
Pricing tiers
partial- Vault Community (BSL)BSL license restricts competing commercial use; self-managed$0 /mo
- HCP Vault StandardHashiCorp Cloud Platform managed Vault; usage-based starting roughly $1.50/hour per clusterQuote
- HCP Vault PlusAdds replication, namespaces, advanced data protection; industry estimate $50K-$500K+ annuallyQuote
- Vault Enterprise (self-managed)Industry estimate $80K-$1M+ annually for enterprise deploymentsQuote
- · Operational expertise for storage, unsealing, replication is a hidden line item
- · HSM integration priced separately
- · Implementation via certified partners $100K-$500K+ typical at enterprise scale
- · Annual price escalators 6-10% at renewal reported
Key features
- +Key-Value (KV) v1 and v2 static secrets engines
- +Dynamic credentials for AWS, Azure, GCP, databases, Kubernetes, SSH
- +PKI secrets engine for full certificate lifecycle
- +Transit secrets engine for encryption-as-a-service
- +Transform secrets engine for format-preserving encryption and tokenization
- +Identity-based access policies with namespaces (Enterprise)
- +Performance and DR replication (Enterprise)
- +HSM auto-unseal and FIPS 140-2 build (Enterprise)
- +Audit devices for full request logging
- +Vault Agent and Secrets Operator for Kubernetes-native workflows
Akeyless Vault Platform
KMS-as-a-service vault-less architecture with Distributed Fragments Cryptography.
Akeyless is the vault-less KMS-as-a-service entrant founded 2018 in Israel, with a $65M Series B in April 2022 led by NGP Capital and Team8. The differentiator is Distributed Fragments Cryptography (DFC), a multi-party computation approach where Akeyless never holds full encryption keys; key fragments are split across regions and the customer controls one. This is the strongest vault-less pitch in the category for compliance teams uncomfortable with a vendor holding full keys. Feature breadth is broad (secrets, dynamic credentials, certificates, encryption-as-a-service, zero-trust access), pricing remains opaque, and the brand recognition still trails Vault and Doppler outside Israel and the regulated-financial segment.
Regulated enterprises (500-50,000 employees) in financial services, healthcare, and critical infrastructure that want vault-less SaaS with vendor-fragment cryptography rather than self-managed Vault.
Greenfield engineering teams wanting Doppler-tier developer ergonomics, or AWS-only estates where AWS Secrets Manager native integration wins on simplicity.
Strengths
- Distributed Fragments Cryptography (DFC): Akeyless never holds full keys
- Vault-less SaaS architecture removes operational burden of self-managed Vault
- Broad feature set (secrets, dynamic credentials, certificates, encryption-as-a-service)
- Strong fit for regulated financial services skeptical of vendor-held keys
- FIPS 140-2 validated; SOC 2 Type 2 and ISO 27001
- Customer-fragment model is genuine architectural differentiation, not marketing
Weaknesses
- Pricing opaque
- Brand recognition trails Vault and Doppler outside Israel and regulated finance
- Smaller community and integration list than Vault
- Implementation depth required to leverage DFC properly
- Developer ergonomics not as polished as Doppler
Pricing tiers
opaque- FreeLimited free tier for evaluation$0 /mo
- TeamIndustry estimate $5-$15 per client/monthQuote
- EnterpriseIndustry estimate $80K-$600K+ annually for enterprise deploymentsQuote
- · Add-on modules (Zero Trust Access, KMS) priced separately
- · Implementation services for DFC setup
- · Annual price escalators reported at 5-9% at renewal
Key features
- +Distributed Fragments Cryptography (DFC) for vendor-never-holds-keys posture
- +Static and dynamic secrets management
- +KMS-as-a-service for encryption operations
- +Certificate lifecycle management
- +Encryption-as-a-service via APIs
- +Zero Trust Application Access (ZTAA) add-on
- +SSH and database secret rotation
- +Kubernetes integration via Akeyless Operator
- +Auditor-ready logging and reporting
- +Customer fragment controlled by buyer (never with Akeyless)
AWS Secrets Manager
Native AWS secrets service for AWS-anchored estates.
AWS Secrets Manager is the native AWS service for secrets storage, rotation, and retrieval, launched 2018 and integrated tightly with AWS KMS, IAM, RDS, Lambda, ECS, and EKS. Best fit for AWS-anchored estates where the value of native integration outweighs the cost of AWS lock-in. The pricing model (per-secret per month plus per-API-call) creates surprises for teams that did not anticipate fan-out across microservices, and rotation is automated only for a fixed set of supported AWS targets; everything else requires custom Lambda rotation functions. Cross-cloud or hybrid-estate buyers will hit the limits of an AWS-only secrets posture quickly.
AWS-anchored estates (any size) where the native integration value outweighs portability cost, and rotation targets are limited to AWS-supported services.
Cross-cloud or hybrid-estate organizations, or buyers wanting deep dynamic credentials and PKI in one platform.
Strengths
- Native AWS integration with KMS, IAM, RDS, Lambda, ECS, EKS
- Automatic rotation for supported targets (RDS engines, Redshift, DocumentDB)
- Tight IAM policy model with resource-based and identity-based policies
- High durability and AWS-region availability inherited from the platform
- Pricing model is fully public on the AWS pricing page
- No separate vendor relationship for AWS-only estates
Weaknesses
- AWS lock-in; not a portable secrets posture across clouds
- Per-secret per month plus per-API-call pricing creates surprises at fan-out
- Rotation automated only for fixed supported targets; everything else needs custom Lambda
- No first-class developer UX; AWS console is acceptable but not delightful
- No PKI engine; ACM Private CA is a separate AWS service
- Cross-account access requires explicit policy work
Pricing tiers
public- Standard pricing$0.40 per secret per month plus $0.05 per 10,000 API calls; same rate across all regions$0 /mo
- · API call costs at high fan-out across microservices
- · KMS key usage charges if customer-managed keys are used
- · Custom Lambda rotation functions for non-AWS targets
- · Cross-account access policy work is buyer-side engineering
Key features
- +Encrypted secret storage with AWS KMS
- +Automatic rotation for supported AWS targets (RDS, Redshift, DocumentDB)
- +Custom rotation via Lambda functions
- +IAM resource-based and identity-based policies
- +CloudTrail audit logging integrated
- +Tight integration with RDS, Lambda, ECS, EKS, CodeBuild
- +Cross-Region replication
- +Resource tagging and ABAC
- +VPC endpoint support
CyberArk Conjur
CyberArk-anchored secrets management inside the Identity Security Platform.
Conjur was acquired by CyberArk in 2017 and is now the secrets-management arm of the CyberArk Identity Security Platform. Two product lines exist: Conjur Open Source (community-maintained) and Conjur Enterprise (commercial, deeply integrated with CyberArk PAM). The buying decision is usually downstream of a CyberArk PAM decision; standalone Conjur evaluations are rare because Vault, Doppler, and Akeyless win on feature depth or developer ergonomics. Best fit only when CyberArk PAM is already deployed and the buyer wants one vendor relationship for human and machine credentials.
CyberArk-anchored regulated enterprises (1,000-50,000+ employees) consolidating secrets management with PAM under the CyberArk Identity Security Platform.
Standalone secrets buyers (Vault, Doppler, Akeyless win), or developer-led teams expecting modern ergonomics.
Strengths
- Deepest integration with CyberArk Privileged Access Manager and Identity Security Platform
- Conjur Open Source provides a free entry point for evaluation
- Strong policy-as-code model (YAML-based)
- Mature Kubernetes integration via Secretless Broker and authenticators
- Auditor-grade evidence trails inherited from CyberArk platform
- CyberArk public-company financial transparency
Weaknesses
- Best value only when CyberArk PAM is already in place; rarely a standalone buying motion
- Developer ergonomics weaker than Doppler, Infisical, or Bitwarden
- Pricing opaque; bundled inside CyberArk Identity Security Platform pricing
- Conjur Open Source velocity has slowed relative to community expectations
- Smaller standalone community than Vault
- Annual price escalators of 7-12% at renewal reported on the CyberArk umbrella contract
Pricing tiers
opaque- Conjur Open SourceApache 2.0; community-maintained$0 /mo
- Conjur Enterprise (standalone)Industry estimate $40K-$300K+ annually; rarely sold standaloneQuote
- CyberArk Identity Security Platform (Conjur included)Industry estimate $200K-$2M+ annually; bundled with CyberArk PAMQuote
- · Modules priced separately inside the CyberArk Identity Security Platform
- · Implementation via certified partners $100K-$500K+ at enterprise scale
- · Annual price escalators 7-12% at renewal on the CyberArk umbrella contract
Key features
- +Centralized policy-as-code (YAML) for secrets and access
- +Secretless Broker for application secret-less workflows
- +Kubernetes authenticator for native pod identity
- +Strong integration with CyberArk Privileged Access Manager
- +JWT and OIDC authenticators for cloud-native workloads
- +Audit logs feed into CyberArk PAM evidence trails
- +Role-based access control with policy inheritance
- +CLI and SDK coverage
- +On-prem and SaaS (CyberArk Privilege Cloud) deployment options
Doppler
Developer-first secrets platform for cloud-native teams.
Doppler is the developer-first secrets management platform for cloud-native engineering teams. Founded 2018, raised a $20M Series B in Feb 2022 led by CRV, and has built its reputation on the cleanest developer ergonomics in the category: Git-style branching for environments, one-line CLI integration, and a UI engineers reach for instead of avoid. 2024 brought a deliberate enterprise expansion (SSO, SCIM, audit log retention, advanced RBAC) while preserving the developer experience that drove early adoption. Best fit for engineering-led teams that do not have a HashiCorp Vault commitment; less appropriate when deep dynamic-credentials or PKI engines are the headline requirement.
Engineering-led cloud-native teams (50-2,000 employees) wanting fast onboarding and clean developer ergonomics over deepest dynamic-credentials breadth.
Regulated enterprises needing CyberArk Conjur-tier auditor evidence trails, or PKI-heavy organizations wanting certificate lifecycle in the same platform.
Strengths
- Cleanest developer ergonomics in the category
- Git-style branching for environments (dev, staging, prod, plus per-branch)
- One-line CLI integration with most languages and frameworks
- Strong UI that engineers actually use rather than route around
- 2024 enterprise expansion added SSO, SCIM, audit log retention, advanced RBAC
- Pricing more transparent than legacy peers (published rates above the Team tier)
Weaknesses
- Lighter on dynamic credentials than Vault or Akeyless
- No PKI secrets engine; certificate lifecycle is not first-party
- Smaller community and integration list than Vault
- Newer entrant; multi-region replication story still maturing
- Enterprise tier pricing opaque (Team and Pro tiers are public)
Pricing tiers
partial- DeveloperFree for up to 5 users; basic projects, environments, and integrations$0 /mo
- Team$18 per seat per month annual; adds RBAC, audit logs, custom roles$18 /emp/mo
- Pro$36 per seat per month annual; adds advanced RBAC, longer audit retention, priority support$36 /emp/mo
- EnterpriseAdds SSO/SAML, SCIM, advanced compliance; industry estimate $40K-$300K+ annuallyQuote
- · SSO/SAML gated to Enterprise tier (industry-standard practice but worth flagging)
- · Audit log retention beyond 90 days requires Enterprise
- · Custom contract terms only available at Enterprise
Key features
- +Static secrets management with project, config, and environment hierarchy
- +Git-style branching for environments
- +CLI integration for most languages and frameworks
- +Doppler Kubernetes Operator for native secret sync
- +Integrations with AWS Secrets Manager, GCP Secret Manager, Azure Key Vault for federation
- +Webhooks and secret-changed triggers
- +Audit logs and granular RBAC
- +SSO/SAML and SCIM (Enterprise)
- +Trusted IPs and IP allowlisting
- +Secret rotation via integrations
Infisical
Open-source modern secrets platform with rapid developer adoption.
Infisical is the fastest-growing open-source modern secrets platform: Y Combinator W23, founded 2022, and gaining developer mindshare in 2025-2026 as a Doppler-shaped product with an MIT-licensed core. The pitch is modern developer ergonomics on top of an open-source foundation, with cloud and self-host options. Feature depth is catching up to Doppler quickly and the post-HashiCorp BSL appetite for OSS alternatives plays directly into Infisical positioning. Trade-offs: younger company, smaller community than Vault or even Bitwarden, enterprise SLA depth still maturing. Best fit for engineering-led teams that want an open-source secrets platform without inheriting Vault operational complexity.
Engineering-led teams (20-1,000 employees) wanting an open-source modern secrets platform with cloud or self-host, without inheriting Vault operational complexity.
Regulated enterprises needing CyberArk Conjur-tier evidence trails or FedRAMP authorization, and organizations needing Vault-tier dynamic credentials breadth.
Strengths
- MIT-licensed open-source core; the cleanest OSS story among modern entrants
- Modern developer ergonomics (UI, CLI, branching environments)
- Y Combinator W23 momentum; product velocity above incumbents
- Self-host option positioned strongly post-HashiCorp BSL switch
- Native Kubernetes integration via Infisical Operator
- Open-source secret scanning included in the platform
Weaknesses
- Younger company; enterprise SLA depth still maturing
- Smaller community and integration list than Vault or Doppler
- Dynamic credentials coverage narrower than Vault or Akeyless
- No PKI secrets engine; certificate lifecycle is not first-party
- Smaller verified-pricing dataset; deal-size predictability is lower
Pricing tiers
partial- Community (self-host)MIT-licensed; self-managed; unlimited secrets and projects$0 /mo
- Cloud FreeUp to 5 users, basic integrations$0 /mo
- Cloud ProAbout $18 per identity per month; adds RBAC, audit logs, SSO$18 /emp/mo
- Cloud EnterpriseIndustry estimate $25K-$200K+ annually; adds SCIM, dedicated support, advanced complianceQuote
- · Self-host operational overhead is buyer-side
- · Enterprise tier custom pricing for larger teams
- · Advanced compliance gates (HIPAA BAA, advanced audit) at Enterprise
Key features
- +MIT-licensed open-source core
- +Static secrets with project, environment, folder hierarchy
- +Environment branching and overrides
- +Native Kubernetes integration via Infisical Operator
- +CLI and SDK coverage (Node, Python, Go, Java, .NET)
- +GitHub Actions, GitLab CI, CircleCI, Jenkins, Vercel integrations
- +Open-source secret scanning for repos and pipelines
- +Audit logs and granular RBAC
- +SSO/SAML and SCIM provisioning (Pro and Enterprise)
- +Self-host option for air-gapped deployments
1Password Secrets Automation
Secrets automation on top of the broader 1Password Business platform.
1Password Secrets Automation is the machine-secrets product line built on top of the broader 1Password Business platform. Founded 2005 in Toronto, the company raised a $620M Series C in Jan 2022 at a roughly $6.8B valuation led by Iconiq Growth. Secrets Automation launched 2021 and the 2024 Trelica acquisition added SaaS governance-and-discovery (shadow IT, app usage, lifecycle), positioning 1Password as a converged human+machine credentials platform. Best fit for organizations already standardized on 1Password Business that want secrets automation without adopting a separate platform; less appropriate when deep dynamic-credentials or PKI engines are the headline requirement.
Mid-market and enterprise buyers (200-10,000 employees) already standardized on 1Password Business who want machine secrets automation without adopting a separate platform.
Engineering teams wanting Vault-tier dynamic credentials, or organizations evaluating secrets-only without a 1Password Business commitment.
Strengths
- Built on the broader 1Password Business platform; one vendor for human and machine credentials
- Connect server bridges on-prem CI/CD and cloud secrets workflows
- Service Accounts model is clean and policy-driven
- Strong CLI and SDK coverage
- Trelica acquisition (2024) adds SaaS governance and shadow-IT discovery
- Pricing more transparent than legacy enterprise peers (Business tier rate is public)
Weaknesses
- Lighter on dynamic credentials than Vault or Akeyless
- No PKI secrets engine; certificate lifecycle is not first-party
- Best value only when 1Password Business is already in place; not a standalone-secrets buying motion
- Secrets Automation pricing opaque (Business tier is public, Secrets Automation is custom)
- Mid-market deployments outgrow the bundled approach when secrets become the dominant workload
Pricing tiers
partial- 1Password Business$7.99 per user per month annual; baseline for Secrets Automation eligibility$8 /emp/mo
- Secrets Automation StarterIndustry estimate $200-$1,000 per month at small-team scaleQuote
- Secrets Automation BusinessIndustry estimate $30K-$200K+ annually mid-enterpriseQuote
- EnterpriseAdds dedicated success, custom SLAs, advanced governanceQuote
- · Secrets Automation priced separately above 1Password Business baseline
- · Trelica governance (post-2024) priced separately
- · Enterprise SSO/SCIM gated to higher tiers
Key features
- +1Password Connect server for on-prem CI/CD and cloud bridging
- +Service Accounts with scoped, policy-driven access
- +CLI (op) with broad language coverage
- +Kubernetes integration via 1Password Kubernetes Operator
- +GitHub Actions, GitLab CI, CircleCI, Jenkins integrations
- +Audit logs and event reporting
- +SCIM provisioning for users and groups
- +Trelica SaaS governance and discovery (post-2024)
- +Secret references and dynamic injection at runtime
Bitwarden Secrets Manager
Open-source heritage extended into machine secrets management.
Bitwarden built its reputation on open-source password management before extending the platform into machine secrets with Bitwarden Secrets Manager (GA 2023). The Insight Partners-led $100M+ Series A in 2022 funded enterprise expansion and the secrets-management product line. The pitch is consistent with the Bitwarden brand: open-source heritage, transparent pricing, and an approachable developer experience for teams already on Bitwarden Business or Enterprise. Feature depth still trails Vault and Doppler in dynamic credentials, but Bitwarden is a credible mid-market option, especially for organizations that prefer to buy human and machine credentials from the same vendor.
Mid-market and lower-enterprise buyers (50-3,000 employees) already on Bitwarden Password Manager who want machine secrets from the same vendor, with self-host option as a fallback.
Regulated enterprises needing CyberArk Conjur-tier evidence trails, or organizations needing Vault-tier dynamic credentials breadth.
Strengths
- Open-source heritage maintained for both Password Manager and Secrets Manager
- Transparent published pricing on the Bitwarden website
- Approachable developer experience and CLI coverage
- Strong fit for orgs already on Bitwarden Password Manager Business or Enterprise
- Self-host option available for fully air-gapped deployments
- Insight Partners $100M+ Series A funded credible enterprise expansion
Weaknesses
- Dynamic credentials coverage trails Vault and Akeyless
- No PKI secrets engine; certificate lifecycle is not first-party
- Secrets Manager is younger; community of practice still building
- Best value only when Bitwarden Business is already in place
- Audit and compliance evidence trails are lighter than enterprise peers
Pricing tiers
public- Bitwarden Business$6 per user per month annual; baseline for Secrets Manager eligibility$6 /emp/mo
- Secrets Manager Team$6 per user per month annual; up to 5 service accounts, 50 secrets per service account$6 /emp/mo
- Secrets Manager Enterprise$12 per user per month annual; unlimited service accounts and secrets$12 /emp/mo
- Enterprise + Self-hostCustom quote for self-host deployment with enterprise SLAsQuote
- · Service account scaling at Team tier (capped at 5)
- · Premium support gated to higher tiers
- · Self-host implementation is buyer-side engineering
Key features
- +Static secrets management with project and folder hierarchy
- +Service accounts with scoped access tokens
- +CLI coverage and SDK (Python, Node, Ruby, Go, Rust, Java, C#)
- +GitHub Actions, GitLab CI, Jenkins, Kubernetes integrations
- +Audit logs and event reporting
- +Open-source codebase with public audit history
- +Self-host option for air-gapped deployments
- +SSO/SAML and SCIM provisioning
- +Hardware security key support for human authentication
Delinea Secret Server (DevOps Secrets Vault)
Legacy Secret Server plus DevOps Secrets Vault on the Delinea Platform.
Delinea (formed when TPG merged Thycotic and Centrify in April 2021) ships two secrets products: the long-running Secret Server (legacy IT secrets vault, primarily for human admins and service accounts) and DevOps Secrets Vault (cloud-native, API-first, for ephemeral workloads). The DevOps Secrets Vault product is the credible developer-secrets story for legacy PAM portfolio buyers; standalone, it competes more directly with Vault and Doppler. Best fit when Delinea PAM is already in place or when an existing Thycotic Secret Server estate wants a cloud-native extension. Trade-offs: TPG ownership signals a sale or recap on the 3-5 year horizon, and standalone Delinea-secrets buying motions are rare.
Mid-market and lower-enterprise buyers (200-5,000 employees) already on Delinea PAM or legacy Thycotic Secret Server wanting a cloud-native DevOps secrets extension.
Standalone-secrets buyers without a Delinea PAM commitment (Vault, Doppler, Akeyless win), or organizations needing FedRAMP High coverage.
Strengths
- Secret Server is a long-running, mature legacy vault used in thousands of mid-market estates
- DevOps Secrets Vault adds a cloud-native, API-first story to the legacy portfolio
- Account Lifecycle Manager (service-account discovery and rotation) is differentiated
- Mid-market pricing routinely under CyberArk equivalents
- Strong customer support consistency vs PE peers
- Tight integration with Delinea PAM (Connection Manager, Privilege Manager)
Weaknesses
- TPG ownership implies a sale or recap on the 3-5 year horizon
- Standalone Delinea-secrets buying motions are rare; usually downstream of Delinea PAM
- DevOps Secrets Vault community is smaller than Vault or Doppler
- Pricing opaque despite mid-market positioning
- Two product lines can confuse buyers (Secret Server vs DevOps Secrets Vault)
Pricing tiers
opaque- Secret Server CloudIndustry estimate $60-$120 per user/yearQuote
- DevOps Secrets VaultIndustry estimate $30K-$200K+ annuallyQuote
- Delinea Platform bundleIndustry estimate $150K-$600K annually mid-enterpriseQuote
- · DevOps Secrets Vault priced separately from Secret Server
- · Account Lifecycle Manager priced separately
- · Implementation services for multi-tenant deployments
- · Annual price escalators 5-9% at renewal reported
Key features
- +Secret Server (vault, session brokering, session recording)
- +DevOps Secrets Vault (cloud-native, API-first, for ephemeral workloads)
- +Account Lifecycle Manager (service account discovery and rotation)
- +Connection Manager for SSH/RDP session brokering
- +Cloud Suite (Centrify-heritage Linux identity bridging)
- +Delinea Platform unified policy engine and reporting
- +Kubernetes integration via DSV agent
- +Mature compliance posture (SOC 2, ISO 27001, HIPAA, FedRAMP)
- +Tight integration with Delinea Privilege Manager (endpoint)
GitGuardian Platform
Secrets-leak detection heritage extended into management (2024).
GitGuardian was the secrets-detection-first vendor of record (its public-GitHub leak monitor put it on the map), founded 2017 in Paris and raising a $44M Series B in 2022. In 2024 the company expanded explicitly into secrets management with the Non-Human Identity (NHI) Security and Vault Insights products, framing the platform as one that finds leaked credentials and helps you rotate them at the source. The pitch is consistent: if leaked-credential discovery is the headline buyer pain, GitGuardian is unrivaled. As a standalone secrets management product, it is younger and shallower than Vault, Doppler, or Akeyless; the platform value compounds when detection and management are bought together.
Security-led buyers (CISO office, 500-20,000 employees) where leaked-credential discovery is the headline pain and management is bought alongside detection.
Platform-engineering-led teams wanting deep dynamic credentials (Vault wins) or developer-first ergonomics (Doppler, Infisical win).
Strengths
- Strongest leaked-credentials detection in the category (public GitHub leak monitor since 2017)
- Non-Human Identity (NHI) Security extends detection into governance for service accounts
- Vault Insights ties leaked credentials back to upstream vault entries
- French-headquartered with EU data-residency and GDPR posture
- $44M Series B 2022 funded enterprise expansion into management
- Strong fit for security-led buyers (CISO office), less so for platform-engineering buyers
Weaknesses
- Standalone secrets management is younger and shallower than Vault, Doppler, or Akeyless
- Best value only when detection plus management are bought together
- Smaller community of practice on the management side
- Pricing opaque
- Less developer ergonomic than Doppler or Infisical
- Dynamic credentials coverage narrower than Vault or Akeyless
Pricing tiers
opaque- Free (public repos)Public GitHub repo monitoring; up to 25 developers$0 /mo
- Business (Detection)Industry estimate $15-$30 per developer/monthQuote
- Enterprise (Detection + NHI Security + Vault Insights)Industry estimate $60K-$500K+ annually for enterprise deploymentsQuote
- · NHI Security and Vault Insights priced separately above detection baseline
- · Implementation services for large estates
- · Annual price escalators 6-10% at renewal reported
Key features
- +Public GitHub repo leak monitoring (free tier and paid)
- +Internal repo and CI/CD pipeline secrets scanning
- +Non-Human Identity (NHI) Security for service-account governance
- +Vault Insights to tie leaked credentials back to upstream vault entries
- +Honeytoken generation and detection
- +Audit logs and event reporting
- +SSO/SAML and SCIM provisioning
- +Slack and PagerDuty incident routing
- +On-prem self-hosted option for regulated buyers
Frequently asked questions
The questions buyers actually ask before they sign.
Does BSI IT-Grundschutz require a specific secrets management product for German KRITIS operators?
How does Betriebsrat co-determination affect secrets management rollout in Germany?
Why does Akeyless rank higher for Germany than for the US or UK in this category?
HashiCorp Vault vs Doppler vs AWS Secrets Manager: which one fits us?
What does HashiCorp Vault BSL license actually mean for us?
Why does secrets rotation matter, and when is it worth automating?
KMS vs vault: are they different things?
Is AWS Secrets Manager lock-in a real problem for us?
How is GitGuardian different from a secrets management platform?
When does an organization actually need secrets management?
What is a dynamic credential, and why does it matter?
Should we self-host Vault, OpenBao, Infisical, or Bitwarden Secrets Manager?
How does Zendikt verify pricing and trust scores?
Final word
Looking at a different market? See the global Secrets Management Software ranking, or pick another country at the top of this page.
Last updated 2026-05-19. Local pricing reverified quarterly. Found something inaccurate? Tell us.