Hush Security delivers a secretless access platform for machine identities. By replacing static secrets with policy-based, just-in-time runtime access, we secure every connection across cloud, on-prem, and hybrid environments. Our technology correlates posture intelligence with live telemetry to prevent credential-based attacks at the source.
Do You Manage Peer Insights at Hush Security?
Access Vendor Portal to update and manage your profile.
Low false positive of the findings and great team which provides very professional service.
I like that this product safe guards service accounts/API by only granting access when needed.
Comprehensive visibility into all NHI across infrastructure and advanced and innovative approach to automated key rotation without disruption
Different integrations required to cover both Cloud and On-Prem environments. Waiting for full OS types to be covered in one unified admin dashboard.
The product has a steep learning curve, so this may require teams to thoroughly define good access policies to prevent excessive permissions, which undercuts security.
Reporting could be improved