Simplify access and management of your secrets (credentials, certificates, and keys) and accelerate your hybrid multicloud and DevOps initiatives.
AKEYLESS BLOG
CategoriesGet started with Akeyless -
News
Secrets Management for Hybrid Cloud – TechStrong TV Interview
Enjoy this very informative and interesting interview where Oded Hareven, Akeyless CEO & co-founder, chats with Mitch Ashley of TechStrong TV about his journey in cloud security and how Akeyless provides a secure SaaS secrets management platform for the enterprise. Video: Below is the transcript of the interview: Mitch Ashley: Well it’s a pleasure being […] -
News
Akeyless Reimagines Cloud Security, Raises $14M Series A
New technology protects enterprises from today’s unique threats Akeyless, the secrets management company, today announced it has secured a $14 million Series A round of financing, led by Team8 and with participation from Jerusalem Venture Partners (JVP). Team8 Press Release and Video JVP Press Release Akeyless experienced tremendous growth in 2020, being recognized by Gartner as a key player in […] -
Security
Using Dynamic Secrets To Achieve Zero Standing Privileges
In their 2019 report Remove Standing Privileges Through a Just-in-Time PAM Approach, Gartner suggested that: “The existence of privileged access carries significant risk, and even with PAM tools in place, the residual risk of users with standing privileges remains high. Security and risk management leaders engaged in IAM must implement a zero standing privileges strategy […] -
DevOps
8 Best Practices for Secrets Management in DevOps
The Current State of Secrets Sprawl Leads to Inefficiency. The combination of proliferation and decentralization of secrets, widely familiar to any… -
DevOps
Integrate Secrets Management into your DevOps Workflow
Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. That should, and can, be changed. -
Security
It’s All About Secrets Management: Preventing a SolarWinds Hack in 2021
Cybersecurity supply chain attacks can be devastating for governments, companies, and even individuals looking to keep their data secure. We recently discovered how chilling this type of attack can be after SolarWinds was hacked and, as a result, about 18,000 organizations were compromised causing billions, if not trillions, of dollars of damage. The bad news […] -
Product Updates
Introducing Tags to Akeyless Vault
Intro to tags In information systems, a tag is a keyword or term assigned to a piece of information, like a digital record. This kind of metadata helps describe an item and allows it to be found again by browsing or searching. People use tags to aid classification, mark ownership, note boundaries, and indicate identity. […] -
Security
Using Akeyless Vault to Enable Zero-Trust Secure Remote Access
Implementing a Zero Trust security model requires that your organization isn’t trusting anyone or anything automatically, from inside or outside of your organization. In this blog we’ll delve into some of Zero Trust principles of Just-in-Time Access, Least Privileged Approach and Zero-Standing Permissions, discussing why Akeyless is in the best position to provide a comprehensive Zero-Trust solution. -
Security
Better Protect Your Ansible Secrets and Privileged Access
Configuration management tools, such as Ansible, have become an attack target for malicious attackers. Find out how to add two layers of protection to your Ansible secrets. -
Security
Better Protect Your Kubernetes Secrets and Privileged Access
Container orchestration tools, such as Kubernetes, have become an attack target for malicious attackers. Find out how to add two layers of protection to your Kubernetes secrets. -
News
Akeyless Vault Secrets Management on the Absolute AppSec Podcast
We were thrilled to get the chance to introduce AKEYLESS to the Absolute AppSec podcast! Our CEO, Oded Hareven, told the story of AKEYLESS Vault, explained…