Overview
Product Information on Hush Security Platform
What is Hush Security Platform?
Hush Security Platform Pricing
Overall experience with Hush Security Platform
“Top1 solution for implementation of the moving target principle on company non human users”
About Company
Company Description
Hush Security delivers a secretless access platform for machine identities. By replacing static secrets with policy-based, just-in-time runtime access, we secure every connection across cloud, on-prem, and hybrid environments. Our technology correlates posture intelligence with live telemetry to prevent credential-based attacks at the source.
Company Details
Do You Manage Peer Insights at Hush Security?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
Reviewer Insights for: Hush Security Platform
Hush Security Platform Likes & Dislikes
Low false positive of the findings and great team which provides very professional service.
Comprehensive visibility into all NHI across infrastructure and advanced and innovative approach to automated key rotation without disruption
I like that this product safe guards service accounts/API by only granting access when needed.
Different integrations required to cover both Cloud and On-Prem environments. Waiting for full OS types to be covered in one unified admin dashboard.
Reporting could be improved
The product has a steep learning curve, so this may require teams to thoroughly define good access policies to prevent excessive permissions, which undercuts security.
Top Hush Security Platform Alternatives
Peer Discussions
Hush Security Platform Reviews and Ratings
- VP, IT Security and Risk Management1B-10B USDBankingReview Source
Top1 solution for implementation of the moving target principle on company non human users
As part of our M&A activities we were looking for a non-human credential management and this solution allowed us to get observability to our secrets and credentials with the right prioritization and credential rotation features without any required effort from legacy applications which uses these APIs. - CHIEF INFORMATION SECURITY OFFICER50M-1B USDSoftwareReview Source
Game changing NHI solution delivering unmatched visibility and safe automated key rotation
Hush Security has transformed how we manage non-human identities across our infrastructure. It provides deep visibility along with unique technology that no other vendor offers for mitigating NHI risks. The automated key rotation approach is both innovative and eliminates the heavy lifting and downtime risks that traditional key rotation - ASSOCIATE<50M USDServices (non-Government)Review Source
Secure Communication Between Apps Balances With Need For Defined Access Policies
Our organization uses an internal app for client scheduling, a telehealth platform, and chat bots, which feed over to each other, and the Hush Security Platform ensures these communications between the apps are secure. - DevOps Manager1B-10B USDSoftwareReview Source
Fast, feedback-driven partner that surfaces real risk, not noise.
Outstanding experience. The team move fast, actively incorporates our feedback and quickly surfaced previously unknown secrets in our environment. Their pace and partnership mindset stands out. - CMO<50M USDSoftwareReview Source
What we've been waiting for
Unique product that addresses a serious issue that we've been thinking about tackling for a long time.



