• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. Hush Security Platform
Logo of Hush Security Platform

Hush Security Platform

byHush Security
in Workload Identity Management
4.7

Overview

Product Information on Hush Security Platform

Updated 13th October 2025

What is Hush Security Platform?

Hush Security Platform is a software designed to protect sensitive digital information and assets for businesses by monitoring, analyzing, and managing potential security risks. The software provides features such as automated risk identification, continuous surveillance of digital footprints, and data leakage prevention. It helps organizations discover exposed data, monitor for unauthorized information disclosures, and mitigate exposure by offering recommendations and remediation guidance. Through its threat analysis capabilities and reporting features, the software supports compliance requirements and assists businesses in reducing the risk of data breaches and reputational harm.

Hush Security Platform Pricing

The Hush Security Platform is a software that offers a subscription-based pricing model with different plans based on the features and level of protection required. Pricing varies depending on the number of users or coverage required, and additional features or higher protection levels are available at higher tiers. Custom pricing may be offered for enterprise or specialized needs.

Overall experience with Hush Security Platform

VP, IT Security and Risk Management
3B - 10B USD, Banking
FAVORABLE

“Top1 solution for implementation of the moving target principle on company non human users”

5.0
Sep 21, 2025
As part of our M&A activities we were looking for a non-human credential management and this solution allowed us to get observability to our secrets and credentials with the right prioritization and credential rotation features without any required effort from legacy applications which uses these APIs.
There are no reviews in this category.
CRITICAL

About Company

Company Description

Updated 11th September 2025

Hush Security delivers a secretless access platform for machine identities. By replacing static secrets with policy-based, just-in-time runtime access, we secure every connection across cloud, on-prem, and hybrid environments. Our technology correlates posture intelligence with live telemetry to prevent credential-based attacks at the source.

Company Details

Updated 11th September 2025
Year Founded
2024
Head office location
Tel Aviv, Israel
Number of employees
51 - 200
Website
https://www.hush.security

Do You Manage Peer Insights at Hush Security?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Reviewer Insights for: Hush Security Platform

Hush Security Platform Likes & Dislikes

Like

Low false positive of the findings and great team which provides very professional service.

Like

Comprehensive visibility into all NHI across infrastructure and advanced and innovative approach to automated key rotation without disruption

Like

I like that this product safe guards service accounts/API by only granting access when needed.

Dislike

Different integrations required to cover both Cloud and On-Prem environments. Waiting for full OS types to be covered in one unified admin dashboard.

Dislike

Reporting could be improved

Dislike

The product has a steep learning curve, so this may require teams to thoroughly define good access policies to prevent excessive permissions, which undercuts security.

Top Hush Security Platform Alternatives

Logo of GitGuardian Platform
1. GitGuardian Platform
4.7
(20 Ratings)
Logo of NHI Management & Secrets Security
2. NHI Management & Secrets Security
4.9
(10 Ratings)
Logo of Token Security
3. Token Security
4.7
(8 Ratings)
View All Alternatives

Peer Discussions

Hush Security Platform Reviews and Ratings

4.7

(6 Ratings)

Rating Distribution

5 Star
67%
4 Star
33%
3 Star
0%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.7

Integration & Deployment

4.5

Service & Support

4.7

Product Capabilities

4.7

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • VP, IT Security and Risk Management
    1B-10B USD
    Banking
    Review Source

    Top1 solution for implementation of the moving target principle on company non human users

    5.0
    Sep 21, 2025
    As part of our M&A activities we were looking for a non-human credential management and this solution allowed us to get observability to our secrets and credentials with the right prioritization and credential rotation features without any required effort from legacy applications which uses these APIs.
  • CHIEF INFORMATION SECURITY OFFICER
    50M-1B USD
    Software
    Review Source

    Game changing NHI solution delivering unmatched visibility and safe automated key rotation

    5.0
    Sep 15, 2025
    Hush Security has transformed how we manage non-human identities across our infrastructure. It provides deep visibility along with unique technology that no other vendor offers for mitigating NHI risks. The automated key rotation approach is both innovative and eliminates the heavy lifting and downtime risks that traditional key rotation
  • ASSOCIATE
    <50M USD
    Services (non-Government)
    Review Source

    Secure Communication Between Apps Balances With Need For Defined Access Policies

    4.0
    Sep 24, 2025
    Our organization uses an internal app for client scheduling, a telehealth platform, and chat bots, which feed over to each other, and the Hush Security Platform ensures these communications between the apps are secure.
  • DevOps Manager
    1B-10B USD
    Software
    Review Source

    Fast, feedback-driven partner that surfaces real risk, not noise.

    5.0
    Sep 17, 2025
    Outstanding experience. The team move fast, actively incorporates our feedback and quickly surfaced previously unknown secrets in our environment. Their pace and partnership mindset stands out.
  • CMO
    <50M USD
    Software
    Review Source

    What we've been waiting for

    5.0
    Sep 17, 2025
    Unique product that addresses a serious issue that we've been thinking about tackling for a long time.
Showing Result 1-5 of 6

Recommended Gartner Research

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.