Simplify access and management of your secrets (credentials, certificates, and keys) and accelerate your hybrid multicloud and DevOps initiatives.
AKEYLESS BLOG
CategoriesGet started with Akeyless -
News
Looking back at KeyConf NYC’21
Our very first KeyConf event came to an end here in New York City, and it was a blast! After a day filled with valuable insights from leading security professionals, KeyConf marks a phenomenal year for Akeyless. Co-founder and CEO Oded Hareven shared on stage: “We’re excited about the traction we’ve seen and the number […] -
News
KeyConf 2021 Is Here! Secrets Management Reimagined
Modern enterprises need to be increasingly dynamic to keep their competitive advantage. They now have many teams using workloads and data to support their DevOps, Cloud Transformation, and Zero Trust Access initiatives. And all these workloads, users, and tools use secrets to communicate securely. It is clear that the increase in secrets usage has gone […] -
Security
Redefining Root of Trust For The Cloud Era (Part 2)
Cloud computing has brought irreversible changes and improvements to the way we share information and conduct business. However, it has also introduced new cybersecurity threats, that if left unaddressed, can result in irreversible damage to a company’s reputation and position in the market. Encryption has been used as a primary defense against data theft, whether […] -
Security
Redefining Root of Trust For The Cloud Era (Part 1)
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting the data, validating identities by authenticating users and devices, and securing transactions with digital signatures and certificates. Beneath the complex world of encryption use cases and algorithms […] -
Security
The Case For Just-In-Time Credentials and Zero Trust Access: Fortinet VPN Credentials Compromised
On September 8 2021, a threat actor released a list with half a million username and passwords for Fortinet VPN deployments. This is very concerning, as the attacker claims a large portion of these credentials are still valid. As a result, it is now easy for a threat actor to launch a customized campaign, targeting […] -
Security
Next Gen Root of Trust To Secure Cryptographic Keys Across The Hybrid Multi-Cloud
In our recent article “Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era” featured in HelpNetSecurity, we discussed how the objective of a Hardware Security Module (HSM) is to ensure that the keys it stores cannot be compromised. When the safety of the keys in an HSM can be assured, […] -
Product Updates
Managing Multitenancy with the Akeyless Terraform Provider
We’re really excited to announce our latest integration – the Akeyless Terraform Provider – to help our customers easily automate your security workload, starting from secrets creation to auth methods to role-based access control and much more. Before we get into what this means for you, let’s talk a bit more about Terraform Providers. What […] -
News
Secrets Management for Hybrid Cloud – TechStrong TV Interview
Enjoy this very informative and interesting interview where Oded Hareven, Akeyless CEO & co-founder, chats with Mitch Ashley of TechStrong TV about his journey in cloud security and how Akeyless provides a secure SaaS secrets management platform for the enterprise. Video: Below is the transcript of the interview: Mitch Ashley: Well it’s a pleasure being […] -
News
Akeyless Reimagines Cloud Security, Raises $14M Series A
New technology protects enterprises from today’s unique threats Akeyless, the secrets management company, today announced it has secured a $14 million Series A round of financing, led by Team8 and with participation from Jerusalem Venture Partners (JVP). Team8 Press Release and Video JVP Press Release Akeyless experienced tremendous growth in 2020, being recognized by Gartner as a key player in […] -
Security
Using Dynamic Secrets To Achieve Zero Standing Privileges
In their 2019 report Remove Standing Privileges Through a Just-in-Time PAM Approach, Gartner suggested that: “The existence of privileged access carries significant risk, and even with PAM tools in place, the residual risk of users with standing privileges remains high. Security and risk management leaders engaged in IAM must implement a zero standing privileges strategy […] -
DevOps
8 Best Practices for Secrets Management in DevOps
The Current State of Secrets Sprawl Leads to Inefficiency. The combination of proliferation and decentralization of secrets, widely familiar to any…