Frequently Asked Questions

Product Information & Partnership

What is the Thales and Akeyless partnership about?

The partnership between Thales and Akeyless brings the Akeyless Vault Secrets Management solution to the Thales CipherTrust Data Security platform. This integration enables Thales customers to benefit from unified secrets management across cloud, on-premises, and hybrid environments, powered by Akeyless's advanced security technologies. The solution provides comprehensive secrets lifecycle management alongside encryption key lifecycle management. Learn more about CipherTrust Secrets Management.

How does Akeyless enhance secrets management for CipherTrust customers?

Akeyless provides CipherTrust customers with a complete, integrated security solution that protects DevOps and IT workload credentials, certificates, and keys. Its platform reduces the total cost of ownership (TCO) for secrets management and offers a highly scalable, cloud-agnostic solution suitable for modern multi-cloud and hybrid infrastructures. The unique Distributed Fragments Cryptography (DFC™) Zero Knowledge technology ensures customers have complete control over their secrets while keeping them secure from unauthorized access. Source

What is Distributed Fragments Cryptography (DFC™) Zero Knowledge technology?

Distributed Fragments Cryptography (DFC™) Zero Knowledge technology is a patented encryption method used by Akeyless to ensure that secrets are protected and only accessible by authorized users. This technology allows customers to maintain complete control over their secrets, preventing unauthorized access—even from the platform provider itself. Source

Features & Capabilities

What features does Akeyless offer for secrets management?

Akeyless offers a wide range of features for secrets management, including Vaultless Architecture, Universal Identity (solving the Secret Zero Problem), Zero Trust Access with granular permissions and Just-in-Time access, automated credential rotation, centralized secrets management, and out-of-the-box integrations with tools like AWS IAM, Azure AD, Jenkins, Kubernetes, and Terraform. The platform is cloud-native and supports hybrid and multi-cloud environments. Learn more

Does Akeyless provide an API for integration?

Yes, Akeyless provides a robust API for its platform, enabling secure interactions for both human and machine identities. API documentation and details on API Keys for authentication are available at Akeyless API documentation.

What technical documentation is available for Akeyless?

Akeyless offers comprehensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS integration, PKI-as-a-Service, and more. These resources provide step-by-step instructions for implementing and using Akeyless solutions. Access the documentation at docs.akeyless.io and tutorials.akeyless.io.

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless is certified for ISO 27001, SOC 2 Type II, FIPS 140-2, PCI DSS, and CSA STAR, ensuring strict adherence to international security and regulatory standards. These certifications make Akeyless suitable for regulated industries such as finance, healthcare, and critical infrastructure. For more details, visit the Akeyless Trust Center.

How does Akeyless protect sensitive data?

Akeyless uses patented encryption technologies, including Distributed Fragments Cryptography (DFC™) Zero Knowledge, to secure data in transit and at rest. The platform enforces Zero Trust Access with granular permissions and Just-in-Time access, minimizing standing privileges and reducing access risks. Audit and reporting tools are provided to ensure compliance and track every secret. Source

Use Cases & Benefits

Who can benefit from Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Notable customers include Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. Learn more

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings, scalability, and compliance. Case studies show up to 70% savings in maintenance and provisioning time, improved employee productivity, and streamlined workflows. Read the Progress case study

Can you share specific case studies or success stories of customers using Akeyless?

Yes, Akeyless has several case studies and success stories. For example, Constant Contact scaled in a multi-cloud, multi-team environment; Cimpress transitioned from Hashi Vault to Akeyless for enhanced security; Progress saved 70% of maintenance and provisioning time; and Wix adopted Akeyless for centralized secrets management. Constant Contact, Cimpress, Progress, Wix

Customer Experience & Ease of Use

What feedback have customers shared about the ease of use of Akeyless?

Customers have praised Akeyless for its user-friendly design and seamless integration. For example, Conor Mancone (Cimpress) noted the smooth setup and worry-free credential management; Shai Ganny (Wix) highlighted the simplicity and security; and Adam Hanson (Constant Contact) emphasized the platform's scalability and enterprise-class capabilities. Cimpress Case Study, Wix Testimonial, Constant Contact Case Study

How long does it take to implement Akeyless, and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native architecture, requiring no infrastructure management. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. Customers can start with self-guided product tours, platform demos, tutorials, and 24/7 support. Product Tour, Platform Demo, Tutorials

Support & Implementation

What customer service and support does Akeyless provide?

Akeyless offers 24/7 customer support via ticket submission, email, and Slack channel. Proactive assistance is available for upgrades and troubleshooting. Customers also have access to extensive technical documentation and tutorials. For unresolved issues, an escalation procedure is in place. Submit a ticket, Email support, Slack Support Channel

What training and technical support is available to help customers get started?

Akeyless provides self-guided product tours, platform demos, tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. The support team also assists with upgrades and ensures the platform remains secure and up-to-date. Product Tour, Platform Demo, Tutorials

How does Akeyless handle maintenance, upgrades, and troubleshooting?

Akeyless provides 24/7 support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades and ensures the platform is up-to-date and secure. Customers have access to technical documentation and tutorials for self-service troubleshooting. Akeyless Resources

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a SaaS-based, vaultless architecture that eliminates the need for heavy infrastructure, reducing costs and complexity compared to HashiCorp Vault's self-hosted model. It provides advanced security features like Universal Identity, Zero Trust Access, and automated credential rotation, ensuring faster deployment and easier scalability. Akeyless vs HashiCorp Vault

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, unlike AWS Secrets Manager which is limited to AWS. It offers better integration across diverse environments, advanced features like Universal Identity and Zero Trust Access, and significant cost savings with a pay-as-you-go pricing model. Akeyless vs AWS Secrets Manager

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It offers advanced security measures like Zero Trust Access and vaultless architecture, reducing operational complexity and costs compared to traditional PAM solutions. Akeyless vs CyberArk

Pain Points & Solutions

What core problems does Akeyless solve?

Akeyless addresses the Secret Zero Problem, legacy secrets management challenges, secrets sprawl, standing privileges and access risks, high operational costs, and integration challenges. Its Universal Identity, Zero Trust Access, automated credential rotation, and cloud-native SaaS platform provide modern solutions to these issues. Case Studies

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

Thales and Akeyless Join Forces for a New Era of Secrets Management

Akeyless and Thales announce CipherTrust Secrets Management Powered by Akeyless

Oded Hareven, Akeyless CEO

I am delighted to announce our partnership with Thales, a global leader in Cybersecurity and Data Protection, to offer the Akeyless Vault Secrets Management solution within the Thales CipherTrust Data Security platform.

Thanks to this revolutionary integration, Thales customers will now benefit from a unified secrets management solution across cloud, on-premises, and hybrid environments. Powered by Akeyless, the CipherTrust Data Security Platform will offer CipherTrust Secrets Management (CSM), providing its customers with a comprehensive solution for secrets lifecycle management alongside encryption key lifecycle management. 

The CipherTrust Manager portal of Data Protection tools, now including the Akeyless Secrets Management tile

This groundbreaking collaboration will transform secrets management by providing a complete, integrated security solution that protects DevOps and IT workload credentials, certificates and keys, reduces the total cost of ownership (TCO) of secrets management, and provides a highly scalable, cloud-agnostic solution that fits seamlessly into modern multi-cloud and hybrid infrastructures. The Akeyless platform’s unique Distributed Fragments Cryptography (DFC™) Zero Knowledge technology ensures that CipherTrust customers have complete control over their secrets while keeping them secure from bad actors.

We are excited to join with Thales in a partnership that is a testament to Akeyless’ place as a leader in Secrets Management. With the ever-evolving security landscape, organizations need reliable and advanced solutions to protect their sensitive data. We are committed to offering our customers the best tools and strategies to keep their valuable assets secure.

Learn more – book a demo today.

Are you a Thales customer? Get more information here.

Never Miss an Update

The latest news and insights about Secrets Management,
Akeyless, and the community we serve.

 

Ready to get started?

Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.

Book a Demo