Frequently Asked Questions

Subcontractors & Data Processing

Who are the subcontractors and sub-processors used by Akeyless?

Akeyless works with a range of third-party vendors, subcontractors, and sub-processors to deliver its business operations and services. These include companies such as Google LLC (GCP and Google Workspace), Atlassian Pty Ltd., Logshero Ltd. (Logz.io), JetBrains s.r.o, Slack Technologies Limited, JFROG LTD, HUBSPOT & CO LTD, Microsoft Corporation (Azure), Pylon Labs, Inc., Amazon Web Services LLC, Twilio Inc., SupportYourApp Inc., and Priority Software Ltd. Each entity provides specific services such as hosting, project management, log management, software development, internal communication, security management, customer support, and more. For a full, up-to-date list, see the Subcontractors List (PDF).

How does Akeyless select and evaluate its subcontractors and sub-processors?

Akeyless uses a commercially reasonable selection process to evaluate the security, privacy, and confidentiality practices of proposed subcontractors and sub-processors. Subcontractors must maintain a written information security program that is at least as rigorous as Akeyless’ own Security Program (see Data Protection Measures). Contracts require immediate notification and cooperation in the event of a security breach, and include audit rights for Akeyless and, where applicable, its customers.

Where is customer data stored and processed by Akeyless subcontractors?

Customer data may be stored and processed in various locations depending on the subcontractor, including the United States, Europe, and Israel. Akeyless considers the location of each subcontractor during onboarding and requires notification if the location changes. For details on each subcontractor’s data storage location, refer to the Subcontractors List table on the webpage.

How does Akeyless ensure security and compliance with its subcontractors?

Akeyless requires all subcontractors to maintain a written information security program that matches or exceeds Akeyless’ own standards. In case of a security breach, subcontractors must immediately inform Akeyless and cooperate to mitigate the breach. Contracts also include audit rights for Akeyless and, where applicable, its customers. For more details, see Akeyless Data Protection Measures.

How can customers stay informed about changes to the subcontractors list?

Akeyless updates its subcontractors list periodically. Customers can register for notifications to receive updates whenever changes are made to the list. The most recent list and notification registration are available on the Subcontractors List page.

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless is certified for ISO 27001, FIPS 140-2, CSA STAR, PCI DSS, and SOC 2 Type II. These certifications demonstrate Akeyless’s commitment to robust security and regulatory compliance. For more details, visit the Akeyless Trust Center.

How does Akeyless protect customer data?

Akeyless uses patented encryption technologies to secure data both in transit and at rest. The platform enforces Zero Trust Access, granular permissions, and Just-in-Time access to minimize standing privileges and reduce access risks. Audit and reporting tools are provided to track every secret and ensure compliance. For more information, visit the Trust Center.

Features & Capabilities

What are the key features of the Akeyless platform?

Akeyless offers Vaultless Architecture, Universal Identity (solving the Secret Zero Problem), Zero Trust Access, automated credential rotation, centralized secrets management, and out-of-the-box integrations with tools like AWS IAM, Azure AD, Jenkins, and Kubernetes. The platform is cloud-native, scalable, and supports hybrid/multi-cloud environments. For a full overview, see the Platform Overview Documentation.

Does Akeyless provide an API?

Yes, Akeyless provides a comprehensive API for its platform, including support for API Keys for secure authentication. API documentation is available at Akeyless API Documentation.

What technical documentation is available for Akeyless?

Akeyless offers extensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS target integration, PKI-as-a-Service, and more. Access all resources at the Akeyless Documentation Portal.

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Notable customers include Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. For more details, visit the About Us page.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance and provisioning time), scalability for hybrid/multi-cloud environments, and improved compliance. Case studies from Progress, Constant Contact, Cimpress, and Wix demonstrate these benefits. See Constant Contact Case Study, Cimpress Case Study, Progress Case Study, and Wix Success Story.

Customer Experience & Support

What feedback have customers shared about the ease of use of Akeyless?

Customers consistently praise Akeyless for its ease of use and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. It’s been a really smooth, really easy process." Shai Ganny (Wix) said, "The simplicity of Akeyless has enhanced our operations and given us the confidence to move forward securely." Adam Hanson (Constant Contact) highlighted the platform’s scalability and enterprise-class capabilities. Read more in the Cimpress Case Study, Wix Testimonial, and Constant Contact Case Study.

How long does it take to implement Akeyless and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native architecture. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. The platform offers self-guided product tours, demos, tutorials, and 24/7 support to ensure a smooth onboarding experience. See Product Tour, Platform Demo, and Tutorials.

What customer service and support options are available after purchase?

Akeyless provides 24/7 customer support via ticket submission (Support Ticket Page) and email ([email protected]). Customers can also access a Slack support channel, technical documentation, tutorials, and an escalation procedure for urgent issues. For more, visit Contact Support.

What training and technical support is available to help customers get started?

Akeyless offers self-guided product tours, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. See Product Tour, Platform Demo, Tutorials, and Technical Documentation.

How does Akeyless handle maintenance, upgrades, and troubleshooting?

Akeyless provides 24/7 support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades and ensures the platform remains up-to-date and secure. Customers have access to technical documentation and tutorials for self-service troubleshooting. For more, visit Contact Support.

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a vaultless, SaaS-based architecture that eliminates the need for heavy infrastructure, reducing costs and complexity. It provides advanced features like Universal Identity, Zero Trust Access, and automated credential rotation, and is designed for hybrid and multi-cloud environments. For a detailed comparison, visit Akeyless vs HashiCorp Vault.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations with diverse tools, and provides advanced features like Universal Identity and Zero Trust Access. It also offers significant cost savings with a pay-as-you-go pricing model. For more, see Akeyless vs AWS Secrets Manager.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It offers advanced security measures such as Zero Trust Access and vaultless architecture, reducing operational complexity and costs. For more, see Akeyless vs CyberArk.

Case Studies & Customer Proof

Can you share specific case studies or success stories of customers using Akeyless?

Yes, Akeyless has several published case studies and video testimonials. Constant Contact scaled in a multi-cloud, multi-team environment using Akeyless (read case study). Cimpress transitioned from Hashi Vault to Akeyless for enhanced security and seamless integration (read case study). Progress saved 70% of maintenance and provisioning time (read case study). Wix adopted Akeyless for centralized secrets management and Zero Trust Access (watch video).

What industries are represented in Akeyless's case studies?

Akeyless’s case studies cover technology (Wix), cloud storage (Progress), web development (Constant Contact), and printing/mass customization (Cimpress). These demonstrate the platform’s versatility across different sectors. See Case Studies for more.

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

Subcontractors List

Last Updated December 31st, 2024

Akeyless uses the third-party vendors, subcontractors, sub-processors or other members, affiliates, of Akeyless, all as listed below (each “Subcontractor”) to conduct and preform its business operations and services.

Certain Subcontractors carry out data-processing activities that involve access to customer personal data (“Customer Data”), these Subcontractors are referred as “Sub-processors” under applicable data protection laws. The Sub-processors process personal data on behalf of Akeyless’ customers, in accordance with customers’ instructions as communicated by Akeyless, and n strict accordance with the terms of a written contract between Akeyless and the said sub-processor.

Akeyless uses commercially reasonable selection process by which it evaluates the security, privacy and confidentiality practices of proposed Subcontractors that will or may have access to or otherwise process Customer Data.

Akeyless requires its Subcontractors to maintain a written information security program, not less rigorous than Akeyless’ Security Program, available at https://www.akeyless.io/data-protection-measures/. Further, in the event of a security breach, Akeyless requires the Subcontractors to immediately inform Akeyless, and cooperate with Akeyless (and to the extent applicable, with Akeyless’ customers) to mitigate the breach. These Subcontractor contracts also include audit rights toward Akeyless, and to the extent applicable towards Akeyless’ customers.

Akyeless considers the locations in which the Subcontractors are established and where would the data be hosted, processed, accesses and transferred when onboarding a new Subcontractor. Akeyless required any Subcontractor to notify Akeyless in case the location has changed.

This list is updated from time to time, including the names and locations of the Subcontractors, Akeyless’ customers shall register below to the Subcontractor change notification [HS1] to receive updates when Akeyless makes changes to the list below.

Entity NameLEI Number or Registration NumberHQ Country and AddressCountry where data is storedNature of provided serviceSub-processor List if Available Online
Google LLC, (GCP and Google Work Space)7ZW8QJWVPR4P1J1KQY451600 Amphitheatre Parkway Mountain View CA 94043, USAUnited States and EuropeHostingList
Atlassian Pty Ltd. 5493005ANNO41NYIM267Level 6, 341 George Street, Sydney, NSW 2000, AustraliaUnited States and EuropeProject managementList
Logshero Ltd.  (Logz.io)515132884 Hamsger 35 ,Tel Aviv – Jaffa. IsraelIsraelLog Management and Observability 
JetBrains s.r.o265 02 275a Hřebenech II 1718/8, Prague, 14000, Czech RepublicEuropeSoftware development and licensing 
Slack Technologies Limited549300VIZRB02KN4IJ45Slack Technologies Limited, Salesforce Tower, 60 R801, North Dock, Dublin, IrelandUSAInternal communication tool for SupportList
JFROG LTD5141304918187, 3 Hamachshev Street, Netanya, 4250465 IsraelIsrael and USASecurity Management ServicesList
HUBSPOT & CO LTDINR2EJN1ERAN0W5ZP974United States of America, Delaware, RA000602USAProvision of dataList
Microsoft Corporation (Azure)INR2EJN1ERAN0W5ZP974One Microsoft Way, Redmond, WA 98052, USAUSA and EuropeHostingList
Pylon Labs, Inc.5360508188 KING STREETUNIT 502SAN FRANCISCO CA 94107USACustomer Support ticketingList
Amazon Web Services LLC549300B1UIM93TXPOD041200 12th Avenue South, Suite 1200, Seattle, WA 98144, USAUSA and EuropeHostingList
Twilio Inc.5493004W8TRGD63APX93375 Beale Street, Suite 300, San Francisco, CA, 94105, U.S.A.USACloud communication platformList
SupportYourApp Inc.55891721007 North Orange Street, 4th Floor, Suite 122, Wilmington, DE 19801, USAUSAHelp Desk and Customer support servicesList
Priority Software Ltd.5111241092 Amal Street, Rosh Haayin 4809202, IsraelIsraelEnterprise Resource Planning