Community
Free
-
3 clientsAdditional client $40/m
-
50 secretsAdditional secret $0.3/m
Akeyless Vault Platform for Workload Identities & Access Management
Free
$2,000/ month
30 days free trial
No credit card required
$4,500/ month
30 days free trial
No credit card required
Let's Talk
SLA & Support Tiers |
Bronze | Silver | Gold | Platinum | Diamond |
---|---|---|---|---|---|
Availability
|
Bronze Best effort | Silver 99.5% | Gold 99.9% | Platinum 99.99% | Diamond Custom |
Serving Regions
|
Bronze 1 | Silver 1 | Gold 2 | Platinum 3 | Diamond Any public region |
Hours of Support availability
|
Bronze Best effort | Silver 9x5 | Gold 9x7 | Platinum 24x7 | Diamond 24x7 |
Response Time - Severity 1
|
Bronze Best effort | Silver 6 hours | Gold 3 hours | Platinum 1 hours | Diamond Custom |
Named Customer Success Engineer
|
Bronze N/A | Silver N/A | Gold Yes | Platinum Yes | Diamond Yes+ |
Client transactions
|
Bronze 200 per day | Silver 2k per day | Gold 4K per day | Platinum 10K per day | Diamond Up to unlimited |
$1,100/ month
30 days free trial*
No credit card required
$2,360/ month
30 days free trial*
No credit card required
Let's Talk
Basic | Professional | Advanced | |
---|---|---|---|
Supported Resources/Protocols | |||
SSH, RDP, Databases, Kubectl, AWS via Web UI
|
Basic
|
Professional
|
Advanced
|
Web Application - SaaS / Internal Applications
|
Basic
|
Professional
|
Advanced
|
Zero-Trust Web Portal (inc. Applications catalog)
|
Basic
|
Professional
|
Advanced
|
Seamless native-client session via Terminal/CLI
|
Basic
|
Professional
|
Advanced
|
Just-in-time access via | |||
Short-lived credentials - known protocols
|
Basic
|
Professional
|
Advanced
|
Short-lived credentials - homegrown apps
|
Basic
|
Professional
|
Advanced
|
Short-lived SSH/TLS certificates
|
Basic
|
Professional
|
Advanced
|
Compliance | |||
Access Audit Log forwarding
|
Basic
|
Professional
|
Advanced
|
Access via Bastion (Session Isolation)
|
Basic
|
Professional
|
Advanced
|
Session Recording
|
Basic
|
Professional
|
Advanced
|
Real-Time Session Revocation
|
Basic
|
Professional
|
Advanced
|
Ultimate protection | |||
Web Application Login Isolation
|
Basic
|
Professional
|
Advanced
|
DLP Connector - Extensive in-session Audit
|
Basic
|
Professional
|
Advanced
|
Leveraging the immense power of the cloud, Akeyless Vault Cloud Service is built on top of multiple availability zones, regions and across clouds, to provide enterprise production-grade resiliency and availability.
Akeyless is certified for ISO 27001, GDPR, FIPS and SOC2 type2, and running periodical penetration testing by world-renowned consultants.
With our patented technology, named Akeyless DFC (Distributed Fragments Cryptography), we are able to operate any cryptographic operation using fragments of encryption keys, without ever combining the fragments, not even during encryption itself.
One of the key fragments is created independently on the customer side and stored so that Akeyless never has access to it. We simply don’t have all of your key fragments and therefore can’t decrypt your secrets.
Akeyless Vault was built from the ground up, on top of a patented technology, and using the most modern cloud native architecture and software design.
Our proprietary software is built by a constantly growing team of highly talented and experienced engineers, previously working for known vendors, driven by the passion to produce and operate a leading enterprise-grade solution.
Clients are applications, services and users. Multiple instances of an application are counted as a single client. Same user using different authentication modes is counted as one.
A Secret is any form of password, credentials, API-key, token, certificate, encryption key or signing keys, either statically set or dynamically created.
For cases where you’d like to strengthen the service continuity, even when your environment is experiencing temporary internet disconnection, we offer an optional component, Akeyless Gateway, which provides configurable in-memory caching of secrets. Our Gateway is provided as a stateless container, with auto-scaling capabilities and fail-safe mechanisms.
Oh yes. We even support more than one level of multi-tenancy. Every tenant can define sub-tenants under it, which helps support any organizational structure you’d like. And that’s not all. Though tenants are isolated, you, as a global admin, can decide what objects are shared among your sub-tenants.