Doppler is the multi-cloud SecretOps Platform developers and security teams trust to provide secrets management at enterprise scale. Thousands of companies of all sizes—from startups to enterprises rely on Doppler to keep their secrets and app configuration in sync across devices, environments, and team members. Goodbye .env files.
Doppler is recommended for software development teams, DevOps engineers, and IT professionals who need a reliable way to manage secrets and environment variables across multiple projects and environments. It is particularly beneficial for teams working on cloud-native applications or using microservices architectures.
Authy is recommended for individuals who seek a user-friendly and secure way to manage their two-factor authentication across multiple devices and platforms. It is suitable for both beginners and experienced users who prioritize security and convenience in their digital security practices.
Based on our record, Authy should be more popular than Doppler. It has been mentiond 139 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
This is why you should use a secrets manager like Doppler (https://doppler.com) or AWS Key Management Service (AWS KMS). Hardcoding your secrets or storing them in .env files will always risk something like this happening. - Source: Hacker News / 11 months ago
How hard would it be to add support for Doppler (https://doppler.com)? - Source: Hacker News / about 1 year ago
If you’re asking yourself where you should be keeping secrets, you should be using a secrets manager. Two examples include Doppler (https://doppler.com). - Source: Hacker News / over 1 year ago
I'm a developer advocate at Doppler (https://doppler.com), and we are a secrets (API keys, certs, etc.) management platform. I create content that's aimed at informing readers about our product. One of the biggest challenges I've encountered is convincing developers to trust our platform in a world of zero trust. Since we store important and sensitive data, we are often asked about how we encrypt data and what we... - Source: Hacker News / over 1 year ago
Doppler (https://doppler.com) is my preferred tool for storing API keys. It centralizes where you manage all of your environmental variables and makes it so you never risk exposing your API keys in a code repo. There's a CLI tool that makes it easy to use all of your environment variables while you're developing and a ton of integrations for wherever you prefer to deploy your... - Source: Hacker News / over 1 year ago
Authy - Two-factor authentication (2FA) on multiple devices, with backups. Drop-in replacement for Google Authenticator. Free for up to 100 successful authentications. - Source: dev.to / over 1 year ago
Https://authy.com/ Acquired by Twilio. I'm not even sure if they still update it, last blog post was 3 years ago. - Source: Hacker News / over 1 year ago
2FA apps such as Google Authenticator and Authy randomly generate a code every minute or so, which is matched to a specific key associated with your login. In essence, this means that whenever a login asks for your 2FA code, it knows which number to expect and will only unlock if that correct number is entered. Source: over 1 year ago
You can also set up the Authy authenticator app on a PC, so you don't have to use a mobile app at all, but use a PC app instead :). Source: almost 2 years ago
Check out authy. It's considered less secure than other device-specific OTP solutions, but it's better than not using it. Source: almost 2 years ago
Vault by HashiCorp - Tool for managing secrets
Google Authenticator - Google Authenticator is a multifactor app for mobile devices.
Infisical - Infisical is an open source, end-to-end encrypted platform that lets you securely sync secrets and configs across your engineering team and infrastructure
Duo Security - Duo Security provides cloud-based two-factor authentication. Duo’s technology can be deployed to protect users, data, and applications from breaches, credential theft, and account takeover.
1Password - 1Password can create strong, unique passwords for you, remember them, and restore them, all directly in your web browser.
Azure Multi-Factor Authentication - Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.