Frequently Asked Questions

Product Overview & Use Cases

What is Akeyless and how does it support hybrid multicloud strategies?

Akeyless is a cloud-native SaaS platform for secrets management, encryption, and identity security. It enables organizations like Progress to centralize secrets management across hybrid and multicloud environments, supporting teams regardless of whether they use AWS, Azure, or Google Cloud. Its vaultless architecture eliminates the need for heavy infrastructure, reducing operational overhead and simplifying workflows. (Source)

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Companies like Progress, Wix, Dropbox, and Constant Contact use Akeyless to manage secrets, enforce zero trust access, and streamline operations. (Source)

What problems does Akeyless solve for organizations?

Akeyless addresses challenges such as secret sprawl, credential exposure, operational overhead from legacy secrets management tools, standing privileges, and integration complexity. It centralizes secrets management, automates credential rotation, enforces zero trust access, and provides out-of-the-box integrations with cloud and DevOps tools. Progress, for example, saved 60–70% of overhead by switching to Akeyless. (Source)

Features & Capabilities

What are the key features of Akeyless?

Akeyless offers vaultless architecture, universal identity (solving the Secret Zero Problem), zero trust access, automated credential rotation, centralized secrets management, cloud-native SaaS deployment, and out-of-the-box integrations with AWS IAM, Azure AD, Jenkins, Kubernetes, and more. (Source)

Does Akeyless provide an API for integration?

Yes, Akeyless provides a comprehensive API for its platform. API documentation and guides are available at docs.akeyless.io/docs, and API Keys are supported for secure authentication. (Source)

What technical documentation is available for Akeyless?

Akeyless offers extensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS integration, PKI-as-a-Service, and more. Resources are available at docs.akeyless.io and tutorials.akeyless.io/docs. (Source)

Security & Compliance

How does Akeyless ensure product security and compliance?

Akeyless complies with international standards such as ISO 27001, SOC 2 Type II, PCI DSS, and GDPR. It holds certifications including ISO 27001, FIPS 140-2, and CSA STAR. The platform uses patented encryption technologies and enforces zero trust access with granular permissions and Just-in-Time access. Audit and reporting tools ensure compliance and readiness. (Source)

What security and compliance certifications does Akeyless have?

Akeyless holds certifications such as ISO 27001, SOC 2 Type II, FIPS 140-2, PCI DSS, and CSA STAR. These certifications demonstrate Akeyless's commitment to security and regulatory compliance for industries such as finance, healthcare, and critical infrastructure. (Source)

Customer Success & Business Impact

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% in maintenance and provisioning time, as seen with Progress), scalability for hybrid and multi-cloud environments, and improved compliance. Employees are relieved from time-consuming security tasks, allowing them to focus on innovation and productivity. (Progress Case Study)

Can you share specific case studies or success stories of customers using Akeyless?

Yes. Progress saved 60–70% of overhead and improved developer productivity by adopting Akeyless for centralized secrets management. Other case studies include Constant Contact scaling in multi-cloud environments, Cimpress transitioning from Hashi Vault to Akeyless, and Wix benefiting from zero trust access. Detailed case studies and video testimonials are available: Progress, Constant Contact, Cimpress, Wix.

What feedback have customers shared about the ease of use of Akeyless?

Customers consistently praise Akeyless for its simplicity and ease of use. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation or leakage. All of our software just works—it’s been a really smooth, really easy process." Shai Ganny (Wix) highlighted the platform's simplicity and its role in enhancing operations. (Cimpress Case Study, Wix Testimonial)

Implementation & Support

How long does it take to implement Akeyless and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native architecture, requiring no infrastructure management. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. The platform offers self-guided tours, demos, tutorials, and 24/7 support to ensure a smooth onboarding experience. (Source)

What training and technical support is available to help customers get started?

Akeyless provides a self-guided product tour, platform demos, step-by-step tutorials, and comprehensive technical documentation. Customers have access to 24/7 support via ticket submission, email, and Slack, as well as proactive assistance for upgrades and troubleshooting. (Product Tour, Support)

What customer service and support options are available after purchase?

Akeyless offers 24/7 customer support, proactive assistance for upgrades, a Slack support channel, technical documentation, tutorials, and an escalation procedure for expedited problem resolution. Customers can submit tickets or email support for help. (Support)

How does Akeyless handle maintenance, upgrades, and troubleshooting?

Akeyless provides round-the-clock support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades, ensures the platform remains secure and up-to-date, and offers extensive technical documentation and tutorials for self-service troubleshooting. (Support)

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a SaaS-based, vaultless architecture that eliminates the need for heavy infrastructure, reducing costs and complexity compared to HashiCorp Vault's self-hosted model. It provides advanced security features like universal identity, zero trust access, and automated credential rotation, with faster deployment and easier scalability. (Akeyless vs HashiCorp Vault)

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations with diverse tools, and provides advanced features like universal identity and zero trust access. Its pay-as-you-go pricing model and cost efficiency differentiate it from AWS Secrets Manager, which is limited to AWS environments. (Akeyless vs AWS Secrets Manager)

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It offers advanced security measures like zero trust access and vaultless architecture, reducing operational complexity and costs compared to traditional PAM solutions like CyberArk Conjur. (Akeyless vs CyberArk)

Industry Coverage & Customer Proof

Which industries are represented in Akeyless's case studies?

Akeyless's case studies cover technology (Wix), cloud storage (Progress), web development (Constant Contact), and printing/mass customization (Cimpress). These examples demonstrate Akeyless's versatility across diverse sectors. (Source)

Who are some of Akeyless's customers?

Akeyless is trusted by organizations such as Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. (Source)

Skip to content

Why Progress Uses Akeyless to Support their Hybrid Multicloud Strategy

Progress Software Corporation (Progress) offers software for creating and deploying business applications. Progress is headquartered in Burlington, Massachusetts with offices in 16 countries and employs approximately 2100 people.

From an organizational perspective, the company is broken down into different divisions, which have individual responsibilities, including application and digital experience, as well as creating tools and/or modules for developers. A newer division is Chef, a leading DevOps tool that was acquired by Progress about one year ago. Progress enables its customers to build high-quality software that delivers a great user experience.

Progress’ CISO, Richard Barretto, has the responsibility to drive the organization’s security strategy and increase business value through security. As the company’s security leader, Barretto works to keep the organization secure and helps prevent it from being involved in the next security breach to headline in the news. His team adds value to the business by enabling the diverse developer teams to focus on innovation and developing software, as opposed to worrying about security.

With so many divisions and teams, many of which were adopted from acquisitions, the developer teams were inundated with disparate tools and needs. However, what they have in common is a rapid growth in secrets usage, needed to access APIs and workloads. With that comes an increased risk of secret sprawl and exposed credentials.

For a while, Progress used Open Source Software (OSS) for its secrets management. But their multicloud strategy requires a central solution that the business teams can simply consume, without spending significant time and money on running and maintaining it. They evaluated many different solutions, including virtualized vaults that are hosted in the cloud. Aside from the cost, Progress determined that this approach would not solve the problem of the operational hassle of maintaining secrets management infrastructure and software updates; the problem would only partially be outsourced to an external team.   

When Progress learned about Akeyless, they were attracted to the simplicity of using a true, purpose-built SaaS platform. They quickly saw the value of it being easily adopted by the different teams, with a wide range of OOTB integrations with their existing cloud services and DevOps tools. With Akeyless, these teams now have access to a centralized secrets management system that is available wherever the staff and workloads are located, regardless if they use AWS, Azure, or Google Cloud. 

In addition to the increased efficiency and security for developer workflows, teams no longer have to waste cycles on maintaining the complex underlying infrastructure and patching software, etc.,  that’s common with traditional secrets management tools. 

Because secrets management is a critical element in an organization’s infrastructure, Progress had to be sure that they could rely on the service being available whenever and wherever needed. Akeyless gave them that confidence with a multi-cloud architecture, multi-regional, highly available, and high-performance platform, that scales.

As a security leader, Richard Barretto highly values the fact that Akeyless customers maintain exclusive ownership of their keys. With cloud provider vaults, or virtualized vault instances, users have to relinquish their master keys, which increases risk as these keys, and the data they protect, can be accessed by rogue administrators, and hackers, or be handed over to the government through the CLOUD act. Akeyless provides a patented, innovative KMS technology (Akeyless DFC) that gives customers complete control and exclusive ownership of their keys, and ensures these keys never exist as a whole. 

Progress saved significant time and money by moving to Akeyless. Just from the perspective of maintaining their previous Vault instances, they saved 60%–70% of overhead and simplified the workflows associated with granting employees access to the resources they need to stay productive and drive the business forward.

Check out the video interview with Richard Barretto below, as well as his KeyConf talk, and learn more about how Progress uses Akeyless to protect against secret sprawl and credential theft, as well as how it implements security best practices while enabling a productive workforce. 

Never Miss an Update

The latest news and insights about Secrets Management,
Akeyless, and the community we serve.

 

Ready to get started?

Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.

Book a Demo