Frequently Asked Questions

Features & Capabilities

What core problems does Akeyless solve for organizations?

Akeyless addresses several critical challenges, including the Secret Zero Problem (secure authentication without storing initial access credentials), legacy secrets management inefficiencies, secrets sprawl, excessive standing privileges, high operational costs, and complex integrations. Its Universal Identity, Zero Trust Access, automated credential rotation, and vaultless architecture help organizations centralize secrets management, automate rotation, and reduce breach risks. Source

What are the key features and benefits of Akeyless?

Akeyless offers Universal Identity (solving the Secret Zero Problem), Zero Trust Access (Just-in-Time access and granular permissions), automated credential rotation, vaultless architecture, centralized secrets management, out-of-the-box integrations (AWS IAM, Azure AD, Jenkins, Kubernetes), and a cloud-native SaaS platform. Benefits include enhanced security, operational efficiency, cost savings (up to 70% in maintenance and provisioning time), scalability, and compliance with international standards. Source

Does Akeyless support Just-In-Time credentials and Zero Trust Access?

Yes, Akeyless provides Just-In-Time temporary credentials and Zero Trust Access. This means credentials are created for each authenticated session and expire when no longer needed, minimizing risk from static secrets. The platform enforces least privilege and granular access controls, reducing standing privileges and unauthorized access risks. Source

How does Akeyless handle secrets management and credential rotation?

Akeyless centralizes secrets management and automates credential rotation, eliminating hardcoded credentials and reducing secrets sprawl. Automated rotation ensures secrets are regularly updated, minimizing the risk of credential leakage and breaches. Source

Does Akeyless provide an API for integration?

Yes, Akeyless offers a comprehensive API for its platform, including support for API Keys for secure authentication. API documentation is available at docs.akeyless.io/docs. Source

What technical documentation is available for Akeyless?

Akeyless provides extensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS integration, PKI-as-a-Service, and more. Resources are available at docs.akeyless.io and tutorials.akeyless.io/docs. Source

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless is certified for ISO 27001, SOC 2 Type II, FIPS 140-2, PCI DSS, and CSA STAR. These certifications demonstrate adherence to strict security and regulatory standards, making Akeyless suitable for regulated industries like finance, healthcare, and critical infrastructure. For details, visit the Akeyless Trust Center. Source

How does Akeyless protect sensitive data and secrets?

Akeyless uses patented encryption technologies to secure data in transit and at rest. The platform enforces zero knowledge of credentials, certificates, and keys, meaning Akeyless cannot access customer secrets. Granular permissions, Just-in-Time access, and audit tools further enhance security and compliance. Source

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Notable customers include Wix, Dropbox, Constant Contact, Cimpress, and Progress Chef. Source

What business impact can customers expect from Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% in maintenance and provisioning time), scalability for multi-cloud environments, regulatory compliance, and improved employee productivity. Source

Can you share specific case studies or customer success stories?

Yes, Akeyless has several case studies and video testimonials. For example, Constant Contact scaled in a multi-cloud environment, Cimpress transitioned from Hashi Vault to Akeyless for enhanced security, Progress saved 70% of maintenance time, and Wix adopted centralized secrets management. See Constant Contact, Cimpress, Progress, and Wix for details.

What feedback have customers given about the ease of use of Akeyless?

Customers consistently praise Akeyless for its ease of use and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation or leakage. It’s been a really smooth, really easy process." Shai Ganny (Wix) highlighted the simplicity and operational confidence gained. Adam Hanson (Constant Contact) emphasized scalability and enterprise-class reliability. Source

Which industries are represented in Akeyless's case studies?

Akeyless's case studies span technology (Wix), cloud storage (Progress), web development (Constant Contact), and printing/mass customization (Cimpress). Source

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a vaultless architecture, eliminating heavy infrastructure and reducing costs. Its SaaS-based deployment provides scalability and operational efficiency, while advanced features like Universal Identity and Zero Trust Access set it apart. HashiCorp Vault is self-hosted and requires more operational overhead. Learn more

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations, and provides cost efficiency with a pay-as-you-go model. AWS Secrets Manager is limited to AWS environments. Akeyless also features Universal Identity and Zero Trust Access for advanced security. Learn more

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It provides granular permissions, Just-in-Time access, and vaultless architecture for simplified infrastructure and reduced costs. Learn more

Implementation & Support

How long does it take to implement Akeyless, and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native design. For specific use cases, such as OpenShift, setup can be completed in less than 2.5 minutes. The platform offers self-guided tours, demos, tutorials, and 24/7 support to ensure a smooth start. Source

What training and technical support is available for new customers?

Akeyless provides a self-guided product tour, platform demos, tutorials, technical documentation, 24/7 support, and a Slack support channel. Proactive assistance is available for upgrades and troubleshooting. Source

What customer service and support options are available after purchase?

Akeyless offers 24/7 customer support via ticket submission, email, and Slack. Proactive assistance is provided for upgrades and maintenance. Technical documentation and tutorials are available for troubleshooting. For escalations, customers can contact [email protected]. Source

How does Akeyless handle maintenance, upgrades, and troubleshooting?

Akeyless provides round-the-clock support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades and ensures the platform remains secure and up-to-date. Extensive technical documentation and tutorials are available for self-service troubleshooting. Source

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

The Case For Just-In-Time Credentials and Zero Trust Access: Fortinet VPN Credentials Compromised

On September 8 2021, a threat actor released a list with half a million username and passwords for Fortinet VPN deployments. This is very concerning, as the attacker claims a large portion of these credentials are still valid. As a result, it is now easy for a threat actor to launch a customized campaign, targeting VPN nodes using these  credentials.

How can such an event be prevented in the future? Let’s analyze the stream of cascading risks that led up to this devastating scenario.

Plain-text storage of secrets: Secrets and other sensitive data should never be stored unencrypted, anywhere. Unfortunately, it is too often that secrets are embedded in scripts or code. In this particular case, it seems the vendor logged credentials in clear-text, which in turn could be extracted through a vulnerability. Whereas leaked data that is encrypted, is virtually useless to a bad actor. Added bonus: under GDPR rule, if compromised personal data is encrypted, organizations are likely exempt from the mandate to publicly announce the leak, avoiding reputational damage and hefty fines.

Using static passwords rather than Just-In-Time credentials: Static secrets remain valid for a long period of time, often indefinitely. When compromised, an attacker has ample opportunity to leverage these for malicious acts. Enforcing short time-to-live secrets decreases the threat potential significantly. Better yet, a unified secrets management solution, like the Akeyless Vaultless® Platform provides features like automated secret rotation, as well as just-in-time temporary credentials creation, which ensures new credentials are used for every new authenticated and authorized session and are set to expire when no longer needed. This centralized, automated approach to secrets management reduces risk, and saves valuable time.

VPNs are the gateway to your kingdom: A VPN gateway is a critical and sensitive component of your network and must be managed with extra priority, given its known vulnerabilities. After all, its design principle provides public access on one side, and then provides access to entire private network segments on the other side. It should go without saying, it is critical to keep an eye out on your vendor’s security alerts and keep your systems up to date.

Newer, more secure technologies like Zero Trust Network Access (ZTNA) are increasingly replacing classic VPNs, and are reducing risk through micro segmentation and more granular, identity-based access control. However, ZTNA still requires architects and administrators to deal with an increasing amount of network complexity. In these days where infrastructure is as fluid as users and endpoints, application abstraction is key. It is counterintuitive that ZTNA still requires that a great deal of trust is given to your ZTNA provider. 

Fortunately, there are simpler and more secure solutions to enable your remote workforce with access to critical apps and data. Akeyless Secure Remote Access provides a unified solution for Zero Trust Application Access (ZTAA) by enabling seamless authentication, just-in-time access, and a least privilege approach. Additionally, Akeyless has zero knowledge of your credentials, certificates, and keys as part of its innovative DFC technology.

Never Miss an Update

The latest news and insights about Secrets Management,
Akeyless, and the community we serve.

 

Ready to get started?

Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.

Book a Demo