Frequently Asked Questions

Business Conduct & Ethical Policy

What is the purpose of the Akeyless Code of Business Conduct and Ethical Policy?

The Akeyless Code of Business Conduct and Ethical Policy establishes guidelines for honest, ethical, and fair behavior among all directors, officers, and employees. It aims to promote integrity, ensure compliance with laws and regulations, deter misconduct, and mandate prompt internal reporting of any breaches. The Code is periodically updated and applies to all employees, who must sign a Certificate of Compliance acknowledging their commitment. Download the full policy (2025).

How does Akeyless handle conflicts of interest?

Akeyless requires employees to avoid actual or apparent conflicts of interest unless approved by the Board. Conflicts can include financial interests, consulting relationships, or receiving gifts from business partners. Employees must report any potential conflicts in writing to the Company or, if a director, to the Chairman of the Board. All gifts valued at or more must be reported and pre-approved, following the company's Gift Policy.

What is Akeyless's policy on anti-corruption and bribery?

Akeyless strictly prohibits all forms of bribery and corruption, adhering to global anti-corruption laws. Employees must not engage in bribery, make facilitation payments, participate in money-laundering, or offer/accept items of value intended to influence business decisions. All suspicious behavior must be reported promptly, and employees are required to attend relevant training and maintain accurate business records.

How does Akeyless promote equal opportunity and prevent discrimination or harassment?

Akeyless is committed to maintaining a workplace free from discrimination and harassment. The company ensures equal opportunity in all aspects of employment, regardless of race, ethnicity, gender, religion, age, disability, or any other protected status. Employees are encouraged to report any incidents, and all complaints are investigated promptly and confidentially. The company also promotes diversity and inclusion through its Workplace Inclusion Policy and Guiding Principles.

What is the Akeyless whistleblower policy?

Akeyless encourages employees, officers, and directors to report any suspected unethical, illegal, or fraudulent activities without fear of retaliation. Reports can be made confidentially or anonymously, and all concerns are investigated thoroughly and impartially.

How can employees report violations of the Code of Conduct?

Employees are encouraged to report suspected violations directly to their immediate manager, the CFO, or the Compliance Officer. All reports are handled confidentially and investigated thoroughly. Breaches may result in disciplinary actions, including termination and legal consequences.

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless holds several industry-recognized certifications, including ISO 27001, FIPS 140-2, CSA STAR, PCI DSS, and SOC 2 Type II. These certifications demonstrate Akeyless's commitment to robust security and regulatory compliance. For more details, visit the Akeyless Trust Center.

How does Akeyless protect sensitive data and ensure compliance?

Akeyless uses patented encryption technologies to secure data in transit and at rest. The platform enforces Zero Trust Access with granular permissions and Just-in-Time access, minimizing standing privileges and reducing access risks. Audit and reporting tools are provided to track every secret, ensuring audit readiness and compliance with regulatory requirements. Learn more at the Trust Center.

Features & Capabilities

What are the key features of the Akeyless platform?

Akeyless offers a vaultless architecture, Universal Identity to solve the Secret Zero Problem, Zero Trust Access, automated credential rotation, centralized secrets management, and a cloud-native SaaS platform. It integrates out-of-the-box with tools like AWS IAM, Azure AD, Jenkins, Kubernetes, and Terraform. These features help organizations enhance security, streamline operations, and reduce costs. Learn more about Akeyless features.

Does Akeyless provide an API and technical documentation?

Yes, Akeyless provides a comprehensive API for its platform. API documentation and technical guides are available at docs.akeyless.io. Additional resources include platform overview, password management, Kubernetes secrets management, AWS integration, PKI-as-a-Service, and more. Access technical documentation.

Support & Implementation

What customer support options are available after purchasing Akeyless?

Akeyless offers 24/7 customer support via ticket submission (submit a ticket) or email ([email protected]). Customers can also access a Slack support channel, technical documentation, and tutorials. For unresolved issues, an escalation procedure is available via [email protected]. Learn more about support.

How long does it take to implement Akeyless, and how easy is it to get started?

Akeyless can be deployed in just a few days due to its SaaS-native architecture, requiring no infrastructure management. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. Customers can use self-guided product tours, platform demos, tutorials, and 24/7 support to get started quickly. Explore the product tour.

What training and technical support are available to help customers adopt Akeyless?

Akeyless provides a self-guided product tour, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. Proactive assistance is offered for upgrades and maintenance. View platform demos.

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Companies like Wix, Dropbox, Constant Contact, and Cimpress use Akeyless for centralized secrets management, Zero Trust Access, and scalable cloud-native solutions. Learn more about the target audience.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% in maintenance and provisioning time), scalability for multi-cloud environments, and improved compliance. Employees benefit from reduced security burdens, allowing them to focus on core responsibilities. Read the Progress case study.

Can you share specific case studies or customer success stories?

Yes, Akeyless has several case studies and video testimonials. For example, Constant Contact scaled in a multi-cloud environment, Cimpress transitioned from Hashi Vault to Akeyless for enhanced security, and Progress saved 70% of maintenance time. Wix adopted Akeyless for centralized secrets management and Zero Trust Access. Constant Contact case study, Cimpress case study, Progress case study, Wix video testimonial.

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a vaultless, cloud-native SaaS platform that eliminates the need for heavy infrastructure, reducing costs and complexity compared to HashiCorp Vault's self-hosted model. It provides advanced security features like Universal Identity, Zero Trust Access, and automated credential rotation, ensuring faster deployment and easier scalability. Akeyless vs HashiCorp Vault.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations with diverse tools, and provides advanced features like Universal Identity and Zero Trust Access. It also offers significant cost savings and better integration across environments compared to AWS Secrets Manager, which is limited to AWS. Akeyless vs AWS Secrets Manager.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It provides advanced security measures like Zero Trust Access and vaultless architecture, reducing operational complexity and costs compared to traditional PAM solutions like CyberArk Conjur. Akeyless vs CyberArk.

Customer Feedback & Proof

What feedback have customers shared about the ease of use of Akeyless?

Customers consistently praise Akeyless for its user-friendly design and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. All of our software that’s running, it just works — we haven’t really had to think about it since then. It’s been a really smooth, really easy process." Shai Ganny (Wix) said, "The simplicity of Akeyless has enhanced our operations and given us the confidence to move forward securely." Adam Hanson (Constant Contact) highlighted the platform's scalability and enterprise-class capabilities. Cimpress Case Study, Wix Testimonial, Constant Contact Case Study.

Who are some of Akeyless's notable customers?

Akeyless is trusted by organizations such as Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. These companies use Akeyless for secure secrets management, Zero Trust Access, and scalable cloud-native solutions. See more customers.

Contact & Additional Resources

Who should I contact at Akeyless for questions about the Code of Conduct or compliance?

For questions regarding the Code of Conduct or compliance, contact Orly Boim (VP of Human Resources) at [email protected], Omer Cohen (Chief Financial Officer) at [email protected], or Shai Onn (President) at [email protected].

Where can I find more information about Akeyless's policies and procedures?

Additional policies and procedures are available on the Akeyless website, including the Workplace Inclusion Policy, Supplier Diversity and Ethical Conduct Policy, Data Protection Measures, Privacy Policy, and more. Visit the Akeyless website for details.

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

Code of Business Conduct and Ethical Policy

Updated October 1, 2025

1. INTRODUCTION

Akeyless Security Ltd. (collectively with its subsidiaries and affiliated companies the “Company”) has adopted this Code of Business Conduct and Ethical Policy (“Code”). This Code, which may be updated periodically, applies to all directors, officers, and employees (each, a “Employees”) of the Company. The Code aims to:

  • Promote honest and ethical behavior, particularly in handling actual or perceived conflicts of interest between personal and professional relationships.
  • Ensure full, fair, accurate, timely, and understandable disclosure in reports and documents filed with or submitted to Company’s management or relevant authorities.
  • Maintain compliance with all applicable laws, rules, and regulations.
  • Deter misconduct and mandate prompt internal reporting of any breaches to ensure accountability for adherence to this Code.

When in doubt, Employees are encouraged to seek guidance and express any concerns they may have regarding this Code. Questions regarding these rules and policies, along with concerns or possible violations, should be promptly reported, to the Chief Financial Officer of the Company (for the purpose of this Code, “Compliance Officer”). 

This Code does not replace any employment contract with which an employee is party and does not in any way constitute a guarantee of continued employment with the Company. In the event of explicit inconsistency between this Code and the individual employment agreements and other agreements between the Company and its employees, officers and directors, such individual agreements shall prevail. In addition, certain matters covered by this Code are also regulated by applicable law. The provisions of this Code are in addition to any applicable law and subject to any such law.

The Human Resources department will present this Code to all Company directors, officers, and employees upon joining the Company and every 24 months thereafter. Employees must sign a Certificate of Compliance, acknowledging that they have read and agreed to abide by all provisions of this Code.

2. COMPLIANCE WITH LAWS AND REGULATIONS

The Company is committed to complying with all applicable laws, rules, and regulations. Employees must understand and adhere to the laws, regulations, policies, and procedures relevant to their roles. Employees should consult their supervisors to identify the applicable laws and necessary training for compliance. Specific policies and procedures are available to those in supervisory roles for guidance, and in any case of missing guidance, the Company’s management will get the proper policies in place, after consulting with the Company’s legal advisors.

3. HONEST, ETHICAL AND FAIR CONDUCT

Every Employee must act with integrity, which includes being honest, fair, and candid. Integrity prohibits deceit, dishonesty, and prioritizing personal gain over the Company’s interests. Employees must:

  • Maintain honesty and confidentiality where required.
  • Follow all applicable laws, rules, and regulations.
  • Adhere to accounting and auditing standards to ensure accurate and complete records.
  • Uphold high ethical standards and avoid unlawful or unethical practices.
  • Treat customers, suppliers, competitors, and colleagues fairly.
  • Avoid manipulation, concealment, and misrepresentation.

4. AVOID ANY CONFLICT OF INTEREST

Employees must avoid actual or apparent conflicts of interest unless approved by the Board. Conflicts extend to immediate family and close relatives. Examples include:

  • Significant ownership interest in suppliers, customers, or competitors.
  • Consulting or employment relationships with suppliers, customers, or competitors.
  • Receiving money, substantial gifts, or excessive entertainment from business partners.
  • Personal financial transactions or relationships with the Company.
  • Taking or transferring opportunities that belong to the Company or are discovered through Company resources.
  • Any situation where personal interests interfere, or appear to interfere, with Company interests.

If you suspect that you have a situation that could give rise to a conflict of interest, or something that others could reasonably perceive as a conflict of interest, you must report it in writing to the Company, or if you are a director, to the Chairman of the Board.

5. ANTI-CORRUPTION AND BRIBERY

The Company strictly prohibits all forms of bribery and corruption, adhering to global anti-corruption laws across all jurisdictions. Corruption involves the misuse of power for private benefits. Bribery is offering or accepting benefits to influence actions improperly.

Prohibited actions include, without limitation:

  • Engaging in bribery or corruption.
  • Making facilitation payments or providing any unofficial commissions or fees.
  • Participating in money-laundering activities.
  • Offering or accepting items of value that might influence or appear to influence business decisions, unless subject to the following Gift Policy.

Employees must:

  • Maintain accurate business records detailing, inter alia, any consideration received or provided.
  • Promptly report any suspicious behavior or breaches.
  • Attend relevant training and confirm understanding of this section.
  • Be aware of the consequences of non-adherence.

6. GIFT POLICY

Gifts (whether in the form of items, services, or gestures), while may just show appreciation, can also create conflicts of interest. Akeyless emphasizes transparency and ethical behavior in all gift-related interactions. Employees must report any gift received, regardless of its value, to their immediate supervisor and document details such as the giver, recipient, occasion, and estimated value. In that regard, the common “cup of coffee” test applies, requiring any gift valued at $10 or more to be reported and pre-approved. Prohibited actions include:

  • Accepting gifts valued above $10 without prior notification and approval.
  • Offering or accepting gifts intended to influence business decisions.
  • Providing or receiving monetary gifts.
  • Engaging in gift exchanges that violate local customs or regulations.
  • Soliciting gifts, entertainment, or business courtesies from those doing business with the Company.

Additionally, each gift must be examined in accordance with the policies and procedures of both Akeyless and the other party to ensure it is legitimate and lawful. Therefore, employees must remain aware of any gift and report it immediately.

7. ANTITRUST

The Company’s global activities are subject to Israeli, U.S., and other international antitrust laws. These laws prohibit actions that restrain trade or reduce competition, such as:

  • Agreements with competitors to fix or control prices.
  • Boycotting specific suppliers or customers.
  • Allocating products, territories, or markets.
  • Limiting the production or sale of products.

Employees must avoid exchanging information with competitors about prices, market share, or other sensitive data that could be seen as a violation of antitrust laws. Non-compliance can result in significant fines for the Company and/or imprisonment of involved personnel, at both Company as well as personal levels.

8. HUMAN RIGHTS

The Company is committed to upholding human rights and ethical conduct. We strictly prohibit the employment of children or any form of child labor, recognizing the importance of their education, well-being, and healthy development. The Company protects individuals under 18 from exploitative practices and ensures their rights are upheld. We unequivocally reject forced labor and all forms of slavery.

The Company provides a work environment that promotes human dignity, freedom, and individual rights. We adhere to local laws on workplace safety and conditions and respect the freedom of association, recognizing employees’ rights to form and join associations of their choice. The Company is dedicated to continuous improvement, transparency, and accountability in building a better future for our employees, stakeholders, and the global community.  

The Company adheres to and fully complies with labor laws. Upon commencement of work at the Company, all employees receive a comprehensive employment notice in a language they understand detailing their terms and conditions, and outlining rights, duties and scope of work. No employee is required to deposit money or identity papers during his/her employment. The Company does not delay or withhold payments to employees under any circumstances other than as required by law or a court order.

9. EXPORT AND TRADE CONTROLS

The Company is committed to adhering to all relevant export, customs, and trade control laws. Any inquiries or investigations by governmental bodies regarding potential violations should be promptly reported to the Company’s leadership. Given the Company’s involvement with encryption-related products, specific export and trade controls may apply. Employees must remain vigilant and consult their direct manager or the Compliance Officer with any questions or concerns related to these matters.

10. WORKPLACE HEALTH AND SAFETY

The Company is committed to providing a clean, safe, and healthy work environment. Each employee is responsible for maintaining workplace safety by adhering to health and safety rules, reporting accidents, injuries, and unsafe conditions or behaviors. Violence and threatening behavior are strictly prohibited. Employees must report to work fit for duty, free from the influence of illegal drugs or alcohol.

11. EQUAL OPPORTUNITY, NON-DISCRIMINATION AND HARASSMENT

The Company is committed to maintaining a workplace free from discrimination and physical, sexual, psychological or verbal harassment by supervisors, co-workers, suppliers and guests. We work together to ensure equal opportunity in all aspects of employment, regardless of race, ethnicity, gender, religion, age, disability, or any other protected status. Discrimination, harassment, or any behavior that creates a hostile work environment is strictly prohibited. Prohibited actions include:

  • Discriminatory or derogatory remarks, jokes, or gestures.
  • Displaying offensive visuals or content.
  • Unwanted physical contact or interference with work.
  • Making employment decisions based on protected statuses. In doing so, the Company is committed to hiring, promoting, and compensating employees solely based on their qualifications.
  • Retaliation against individuals reporting discrimination or harassment.

Sexual Harassment – All Employees must familiarize themselves with and adhere to the Company’s sexual harassment policy. If you experience or witness any form of discrimination or harassment, report it to your immediate supervisor or HR. All complaints will be investigated promptly, fairly, and discreetly, with confidentiality maintained to the extent possible. Retaliation for reporting concerns in good faith is strictly prohibited.

Equal Opportunity – Akeyless believes in creating a welcoming and inclusive work environment where everyone feels a sense of belonging. We believe that diverse perspectives enhance our creativity and business success. We define our commitment in various ways, and we rely on your support to create an inclusive workplace. You can contribute by:

  • Speaking up when you witness or experience bias or discrimination.
  • Sharing your perspective openly and honestly.
  • Listening actively to diverse viewpoints and engaging in respectful dialogue.
  • Proposing new initiatives or cross-cultural activities.

For more information on our inclusive workplace, please refer to the Akeyless Workplace Inclusion Policy and Guiding Principles.

12. CONFIDENTIALITY AND RECORD KEEPING

The Company takes confidentiality obligations very seriously. Employees must not disclose, share, or discuss any confidential information about Akeyless or its customers and authorized users without prior approval from the information owner. This includes discussions about prices and terms of service.

Company’s books, records, accounts, and financial statements must be detailed, accurately reflect the Company’s transactions, and comply with applicable laws and internal controls. The financial, accounting, and legal teams are responsible for implementing procedures to ensure proper internal and disclosure controls. All Employees must cooperate with these procedures to maintain integrity and compliance.

13. PROTECTING DIGITAL ASSETS AND CYBERSECURITY

Akeyless provides robust cybersecurity solutions to safeguard the valuable digital assets of the Company and its clients. However, all employees share the responsibility for cybersecurity and must actively protect Company networks, systems, devices, and information.

To fulfill this responsibility, employees are required to:

  • Remain vigilant for potential threats to the security of our information and technology systems.
  • Report anything suspicious to the IT team using internal protocols.
  • Adhere strictly to all IT cybersecurity guidelines and policies.

14. WHISTLEBLOWER POLICY

The Company encourages employees, officers, and directors to report any suspected unethical, illegal, or fraudulent activities without fear of retaliation. Employees can be assured that all reports will be kept confidential to the extent possible and expect a thorough and unbiased investigation into the matter.

However, if an employee feels uncomfortable or fears retaliation when reporting a violation, they have the option to file a complaint anonymously, ensuring their concerns are heard without compromising their identity.

15. REPORTING AND ADDRESSING VIOLATIONS OF THE CODE

Employees are encouraged to report any suspected violations of this Code directly to their immediate manager, the CFO, or the Compliance Officer. Ensuring adherence to this Code is a collective responsibility, and all reports will be handled confidentially and investigated thoroughly.

Breaching this Code may result in disciplinary actions, up to and including termination of employment. This is in addition to any legal consequences that may arise from violations.

16. ADDITIONAL POLICIES AND PROCEDURES

Other policies or procedures set forth by the Company, whether communicated in writing or made known to its members, remain in full force and effect.


COMPANY CONTACT INFORMATION

TitleNameE-mail address
VP of Human ResourcesOrly Boim[email protected]
Chief Financial OfficerOmer Cohen[email protected]
PresidentShai Onn[email protected]


CERTIFICATE OF COMPLIANCE

All employees are required to sign this Certificate of Compliance. If you are unsure about your  adherence to the Code of Conduct, please consult with the VP of Human Resources or the CFO and attach a written explanation to this Certificate.


I hereby certify that:

  1. I have read and understood the Company’s Corporate Code of Conduct.
  2. I am currently in compliance with all provisions of the Code and will continue to comply with them.
  3. I am not aware of any violations of the Code by any Company employee or manager, except as noted in the attached memorandum (if applicable).
  4. I acknowledge that the Company may amend, modify, or terminate the Code at its discretion.


Name: _________________________________________________

Department:  ____________________________________________

Signature: __________________

Date: _____________________