Frequently Asked Questions

Subcontractors & Data Processing

Who are the subcontractors and sub-processors used by Akeyless?

Akeyless works with a range of third-party vendors, subcontractors, and sub-processors to deliver its business operations and services. These include companies such as Google LLC (GCP and Google Workspace), Atlassian Pty Ltd., Logshero Ltd. (Logz.io), JetBrains s.r.o, Slack Technologies Limited, JFROG LTD, HUBSPOT & CO LTD, Microsoft Corporation (Azure), Pylon Labs, Inc., Amazon Web Services LLC, Twilio Inc., SupportYourApp Inc., and Priority Software Ltd. Each entity provides specific services such as hosting, project management, log management, software development, internal communication, security management, customer support, and more. For a full, up-to-date list, see the Subcontractors List (PDF).

How does Akeyless select and evaluate its subcontractors and sub-processors?

Akeyless uses a commercially reasonable selection process to evaluate the security, privacy, and confidentiality practices of proposed subcontractors and sub-processors. Subcontractors must maintain a written information security program that is at least as rigorous as Akeyless’ own Security Program (see Data Protection Measures). Contracts require immediate notification and cooperation in the event of a security breach, and include audit rights for Akeyless and, where applicable, its customers.

Where is customer data stored and processed by Akeyless subcontractors?

Customer data may be stored and processed in various locations depending on the subcontractor, including the United States, Europe, and Israel. Akeyless considers the location of each subcontractor during onboarding and requires notification if the location changes. For details on each subcontractor’s data storage location, refer to the Subcontractors List table on the webpage.

How does Akeyless ensure security and compliance with its subcontractors?

Akeyless requires all subcontractors to maintain a written information security program that matches or exceeds Akeyless’ own standards. In case of a security breach, subcontractors must immediately inform Akeyless and cooperate to mitigate the breach. Contracts also include audit rights for Akeyless and, where applicable, its customers. For more details, see Akeyless Data Protection Measures.

How can customers stay informed about changes to the subcontractors list?

Akeyless updates its subcontractors list periodically. Customers can register for notifications to receive updates whenever changes are made to the list. The most recent list and notification registration are available on the Subcontractors List page.

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless is certified for ISO 27001, FIPS 140-2, CSA STAR, PCI DSS, and SOC 2 Type II. These certifications demonstrate Akeyless’s commitment to robust security and regulatory compliance. For more details, visit the Akeyless Trust Center.

How does Akeyless protect customer data?

Akeyless uses patented encryption technologies to secure data both in transit and at rest. The platform enforces Zero Trust Access, granular permissions, and Just-in-Time access to minimize standing privileges and reduce access risks. Audit and reporting tools are provided to track every secret and ensure compliance. For more information, visit the Trust Center.

Features & Capabilities

What are the key features of the Akeyless platform?

Akeyless offers Vaultless Architecture, Universal Identity (solving the Secret Zero Problem), Zero Trust Access, automated credential rotation, centralized secrets management, and out-of-the-box integrations with tools like AWS IAM, Azure AD, Jenkins, and Kubernetes. The platform is cloud-native, scalable, and supports hybrid/multi-cloud environments. For a full overview, see the Platform Overview Documentation.

Does Akeyless provide an API?

Yes, Akeyless provides a comprehensive API for its platform, including support for API Keys for secure authentication. API documentation is available at Akeyless API Documentation.

What technical documentation is available for Akeyless?

Akeyless offers extensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS target integration, PKI-as-a-Service, and more. Access all resources at the Akeyless Documentation Portal.

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Notable customers include Wix, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, K Health, and Dropbox. For more details, visit the About Us page.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance and provisioning time), scalability for hybrid/multi-cloud environments, and improved compliance. Case studies from Progress, Constant Contact, Cimpress, and Wix demonstrate these benefits. See Constant Contact Case Study, Cimpress Case Study, Progress Case Study, and Wix Success Story.

Customer Experience & Support

What feedback have customers shared about the ease of use of Akeyless?

Customers consistently praise Akeyless for its ease of use and seamless integration. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. It’s been a really smooth, really easy process." Shai Ganny (Wix) said, "The simplicity of Akeyless has enhanced our operations and given us the confidence to move forward securely." Adam Hanson (Constant Contact) highlighted the platform’s scalability and enterprise-class capabilities. Read more in the Cimpress Case Study, Wix Testimonial, and Constant Contact Case Study.

How long does it take to implement Akeyless and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native architecture. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. The platform offers self-guided product tours, demos, tutorials, and 24/7 support to ensure a smooth onboarding experience. See Product Tour, Platform Demo, and Tutorials.

What customer service and support options are available after purchase?

Akeyless provides 24/7 customer support via ticket submission (Support Ticket Page) and email ([email protected]). Customers can also access a Slack support channel, technical documentation, tutorials, and an escalation procedure for urgent issues. For more, visit Contact Support.

What training and technical support is available to help customers get started?

Akeyless offers self-guided product tours, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support and a Slack channel are available for troubleshooting and guidance. See Product Tour, Platform Demo, Tutorials, and Technical Documentation.

How does Akeyless handle maintenance, upgrades, and troubleshooting?

Akeyless provides 24/7 support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades and ensures the platform remains up-to-date and secure. Customers have access to technical documentation and tutorials for self-service troubleshooting. For more, visit Contact Support.

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a vaultless, SaaS-based architecture that eliminates the need for heavy infrastructure, reducing costs and complexity. It provides advanced features like Universal Identity, Zero Trust Access, and automated credential rotation, and is designed for hybrid and multi-cloud environments. For a detailed comparison, visit Akeyless vs HashiCorp Vault.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations with diverse tools, and provides advanced features like Universal Identity and Zero Trust Access. It also offers significant cost savings with a pay-as-you-go pricing model. For more, see Akeyless vs AWS Secrets Manager.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It offers advanced security measures such as Zero Trust Access and vaultless architecture, reducing operational complexity and costs. For more, see Akeyless vs CyberArk.

Case Studies & Customer Proof

Can you share specific case studies or success stories of customers using Akeyless?

Yes, Akeyless has several published case studies and video testimonials. Constant Contact scaled in a multi-cloud, multi-team environment using Akeyless (read case study). Cimpress transitioned from Hashi Vault to Akeyless for enhanced security and seamless integration (read case study). Progress saved 70% of maintenance and provisioning time (read case study). Wix adopted Akeyless for centralized secrets management and Zero Trust Access (watch video).

What industries are represented in Akeyless's case studies?

Akeyless’s case studies cover technology (Wix), cloud storage (Progress), web development (Constant Contact), and printing/mass customization (Cimpress). These demonstrate the platform’s versatility across different sectors. See Case Studies for more.

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

Subcontractors List

Last Updated March 5, 2026

Akeyless uses third-party vendors, subcontractors, sub-processors or Akeyless’ affiliates, all as listed below (each “Subcontractor“) to conduct and perform its business operations and services.

Certain Subcontractors carry out data-processing activities that involve access to customer personal data (“Customer Data“), these Subcontractors are referred to as “Sub-processors” under applicable data protection laws. The Sub-processors process personal data on behalf of Akeyless’ customers, in accordance with customers’ instructions as communicated by Akeyless, and in strict compliance with the data processing agreement executed between Akeyless and the Sub-processor.

Akeyless evaluates Subcontractors’ security, privacy and confidentiality means on an annual basis. Akeyless requires its Subcontractors to maintain a written information security program, not less rigorous than Akeyless’ Security Program, available at https://www.akeyless.io/data-protection-measures/. Further, in the event of a security breach, Akeyless requires the Subcontractors to immediately inform Akeyless, and cooperate with Akeyless (and to the extent applicable, with Akeyless’ customers) to mitigate the breach. These Subcontractor contracts also include audit rights toward Akeyless, and to the extent applicable towards Akeyless’ customers.

Akeyless considers the locations in which the Subcontractors are established and where the data would be hosted, processed, accessed and transferred when onboarding a new Subcontractor. Akeyless requires any Subcontractor to notify Akeyless in the event the location has changed.

This list is updated from time to time, including the names and locations of the Subcontractors. Akeyless’ customers shall register below to the Subcontractor change notification to receive updates when Akeyless makes changes to the list below.

The following tables describe the legal entities engaged by Akeyless in the provision of the services.

Entity NameIs this vendor a Sub-processor as defined above?LEI Number or Registration NumberHQ Country and AddressCountry where data is storedNature of provided serviceDPASub-processor List
Google LLC, (Google Cloud, Google Work Space, Vertex API, Gemini).Yes (GCP and Vertex)7ZW8QJWVPR4P1J1KQY451600 Amphitheatre Parkway Mountain View CA 94043, USAUnited States and EuropeHosting Gemini LLMDPAList
Microsoft Corporation (Azure)YesINR2EJN1ERAN0W5ZP974One Microsoft Way, Redmond, WA 98052, USAUSA and EuropeHostingDPA (offline version)List
Microsoft Corporation (Visual Studio)NoINR2EJN1ERAN0W5ZP974One Microsoft Way, Redmond, WA 98052, USAUSA and EuropeDebug, build code, development
Microsoft Corporation (OpenAI)YesINR2EJN1ERAN0W5ZP974One Microsoft Way, Redmond, WA 98052, USAUSA and EuropeAI responses, insights, summaries.DPAList
Atlassian Pty Ltd.No5493005ANNO41NYIM267Level 6, 341 George Street, Sydney, NSW 2000, AustraliaUnited States and EuropeProject managementDPAList
Anysphere, Inc. (dba “Cursor”)NoNA2261 Market Street STE 86466, San Francisco, CA 94114United StatesSoftware development and licensing (AI Coding generation tool).DPAList
Slack Technologies LimitedNo549300VIZRB02KN4IJ45Slack Technologies Limited, Salesforce Tower, 60 R801, North Dock, Dublin, IrelandUSAInternal communication tool for SupportGeneral DPA
US DPA
List
OKTA Inc.No549300N8J06I8MRHU6203500 S DUPONT HWY, DOVER, 19901, United States of AmericaUSAIdentity and access management (IAM)DPAList
JFROG LTDNo5141304918187, 3 Hamachshev Street, Netanya, 4250465 IsraelIsrael and USASecurity Management ServicesDPAList
HUBSPOT & CO LTDNoINR2EJN1ERAN0W5ZP974United States of America, Delaware, RA000602USAProvision of dataDPAList
Coralogix Ltd.No515079630Abba Hillel Silver Rd. 19 Ramat Gan, IsraelIsraelSession recording, log auditing, analyticDPAList
Pylon Labs, Inc.No5360508188 KING STREET UNIT 502 SAN FRANCISCO CA 94107USACustomer Support ticketingDPAList
Amazon Web Services LLCYes549300B1UIM93TXPOD041200 12th Avenue South, Suite 1200, Seattle, WA 98144, USAUSA and EuropeHostingDPAList
Twilio Inc.No5493004W8TRGD63APX93375 Beale Street, Suite 300, San Francisco, CA, 94105, U.S.A.USACloud communication platformDPAList
Priority Software Ltd.No5111241092 Amal Street, Rosh Haayin 4809202, IsraelIsraelEnterprise Resource PlanningOffline DPA

Duration: For each Sub-processor, processing of personal data will be for the duration that the customer uses and continues to use the Service(s), and for the retention periods as set out in customer’s data processing agreement. Otherwise, for Subcontractors, Akeyless reserves the right to replace, amend and terminate any relationship and will request data deletion upon termination.