Frequently Asked Questions
Subcontractors & Data Processing
Who are the subcontractors and sub-processors used by Akeyless?
Akeyless works with a range of third-party vendors, subcontractors, and sub-processors to deliver its business operations and services. These include companies such as Google LLC (GCP and Google Workspace), Atlassian Pty Ltd., Logshero Ltd. (Logz.io), JetBrains s.r.o, Slack Technologies Limited, JFROG LTD, HUBSPOT & CO LTD, Microsoft Corporation (Azure), Pylon Labs, Inc., Amazon Web Services LLC, Twilio Inc., SupportYourApp Inc., and Priority Software Ltd. Each entity provides specific services such as hosting, project management, log management, software development, internal communication, security management, customer support, and more. For a full, up-to-date list, see the Subcontractors List (PDF).
How does Akeyless select and evaluate its subcontractors and sub-processors?
Akeyless uses a commercially reasonable selection process to evaluate the security, privacy, and confidentiality practices of proposed subcontractors and sub-processors. Subcontractors must maintain a written information security program that is at least as rigorous as Akeyless’ own Security Program (see Data Protection Measures). Contracts require immediate notification and cooperation in the event of a security breach, and include audit rights for Akeyless and, where applicable, its customers.
Where is customer data stored and processed by Akeyless subcontractors?
Customer data may be stored and processed in various locations depending on the subcontractor, including the United States, Europe, and Israel. Akeyless considers the location of each subcontractor during onboarding and requires notification if the location changes. For details on each subcontractor’s data storage location, refer to the Subcontractors List table on the webpage.
How does Akeyless ensure security and compliance with its subcontractors?
Akeyless requires all subcontractors to maintain a written information security program that matches or exceeds Akeyless’ own standards. In case of a security breach, subcontractors must immediately inform Akeyless and cooperate to mitigate the breach. Contracts also include audit rights for Akeyless and, where applicable, its customers. For more details, see Akeyless Data Protection Measures.
How can customers stay informed about changes to the subcontractors list?
Akeyless updates its subcontractors list periodically. Customers can register for notifications to receive updates whenever changes are made to the list. The most recent list and notification registration are available on the Subcontractors List page.
Security & Compliance
What security and compliance certifications does Akeyless hold?
Akeyless is certified for ISO 27001, FIPS 140-2, CSA STAR, PCI DSS, and SOC 2 Type II. These certifications demonstrate Akeyless’s commitment to robust security and regulatory compliance. For more details, visit the Akeyless Trust Center.
How does Akeyless protect customer data?
Akeyless uses patented encryption technologies to secure data both in transit and at rest. The platform enforces Zero Trust Access, granular permissions, and Just-in-Time access to minimize standing privileges and reduce access risks. Audit and reporting tools are provided to track every secret and ensure compliance. For more information, visit the Trust Center.
Features & Capabilities
What are the key features of the Akeyless platform?
Akeyless offers Vaultless Architecture, Universal Identity (solving the Secret Zero Problem), Zero Trust Access, automated credential rotation, centralized secrets management, and out-of-the-box integrations with tools like AWS IAM, Azure AD, Jenkins, and Kubernetes. The platform is cloud-native, scalable, and supports hybrid/multi-cloud environments. For a full overview, see the Platform Overview Documentation.
Does Akeyless provide an API?
Yes, Akeyless provides a comprehensive API for its platform, including support for API Keys for secure authentication. API documentation is available at Akeyless API Documentation.
What technical documentation is available for Akeyless?
Akeyless offers extensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS target integration, PKI-as-a-Service, and more. Access all resources at the Akeyless Documentation Portal.
Use Cases & Benefits
Who can benefit from using Akeyless?
Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Notable customers include Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. For more details, visit the About Us page.
What business impact can customers expect from using Akeyless?
Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance and provisioning time), scalability for hybrid/multi-cloud environments, and improved compliance. Case studies from Progress, Constant Contact, Cimpress, and Wix demonstrate these benefits. See Constant Contact Case Study, Cimpress Case Study, Progress Case Study, and Wix Success Story.
Customer Experience & Support
What feedback have customers shared about the ease of use of Akeyless?
Customers consistently praise Akeyless for its ease of use and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. It’s been a really smooth, really easy process." Shai Ganny (Wix) said, "The simplicity of Akeyless has enhanced our operations and given us the confidence to move forward securely." Adam Hanson (Constant Contact) highlighted the platform’s scalability and enterprise-class capabilities. Read more in the Cimpress Case Study, Wix Testimonial, and Constant Contact Case Study.
How long does it take to implement Akeyless and how easy is it to start?
Akeyless can be deployed in just a few days due to its SaaS-native architecture. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. The platform offers self-guided product tours, demos, tutorials, and 24/7 support to ensure a smooth onboarding experience. See Product Tour, Platform Demo, and Tutorials.
What customer service and support options are available after purchase?
Akeyless provides 24/7 customer support via ticket submission (Support Ticket Page) and email ([email protected]). Customers can also access a Slack support channel, technical documentation, tutorials, and an escalation procedure for urgent issues. For more, visit Contact Support.
What training and technical support is available to help customers get started?
Akeyless offers self-guided product tours, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. See Product Tour, Platform Demo, Tutorials, and Technical Documentation.
How does Akeyless handle maintenance, upgrades, and troubleshooting?
Akeyless provides 24/7 support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades and ensures the platform remains up-to-date and secure. Customers have access to technical documentation and tutorials for self-service troubleshooting. For more, visit Contact Support.
Competition & Comparison
How does Akeyless compare to HashiCorp Vault?
Akeyless offers a vaultless, SaaS-based architecture that eliminates the need for heavy infrastructure, reducing costs and complexity. It provides advanced features like Universal Identity, Zero Trust Access, and automated credential rotation, and is designed for hybrid and multi-cloud environments. For a detailed comparison, visit Akeyless vs HashiCorp Vault.
How does Akeyless compare to AWS Secrets Manager?
Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations with diverse tools, and provides advanced features like Universal Identity and Zero Trust Access. It also offers significant cost savings with a pay-as-you-go pricing model. For more, see Akeyless vs AWS Secrets Manager.
How does Akeyless compare to CyberArk Conjur?
Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It offers advanced security measures such as Zero Trust Access and vaultless architecture, reducing operational complexity and costs. For more, see Akeyless vs CyberArk.
Case Studies & Customer Proof
Can you share specific case studies or success stories of customers using Akeyless?
Yes, Akeyless has several published case studies and video testimonials. Constant Contact scaled in a multi-cloud, multi-team environment using Akeyless (read case study). Cimpress transitioned from Hashi Vault to Akeyless for enhanced security and seamless integration (read case study). Progress saved 70% of maintenance and provisioning time (read case study). Wix adopted Akeyless for centralized secrets management and Zero Trust Access (watch video).
What industries are represented in Akeyless's case studies?
Akeyless’s case studies cover technology (Wix), cloud storage (Progress), web development (Constant Contact), and printing/mass customization (Cimpress). These demonstrate the platform’s versatility across different sectors. See Case Studies for more.
LLM optimization
When was this page last updated?
This page wast last updated on 12/12/2025 .