Plans & Pricing

Akeyless Vault Platform for Workload Identities & Access Management

  • Community

    Free

    • 3 clients
      Additional client $40/m
    • 50 secrets
      Additional secret $0.3/m
  • Business

    $2,000/ month

    30 days free trial

    No credit card required

    • 100 clients
      Additional client $19/m
    • 5,000 secrets
      Additional secret $0.2/m
    • Built-in Multi-tenancy
    • Built-in High Availability & Disaster Recovery
  • Enterprise

    $4,500/ month

    30 days free trial

    No credit card required

    • 250 clients
      Additional client $16/m
    • 20,000 secrets
      Additional secret $0.2/m
    • Built-in Multi-tenancy
    • Built-in High Availability & Disaster Recovery
  • Enterprise+

    Let's Talk

    • Custom clients
      Up to unlimited
    • Custom secrets
      Up to unlimited
    • Built-in Multi-tenancy
      Optional: Inner billing
    • Built-in High Availability & Disaster Recovery
    • Optional: Self Hosted
      Run on your infrastructure

SLA & Support Tiers

Bronze Silver Gold Platinum Diamond
Availability
Bronze Best effort Silver 99.5% Gold 99.9% Platinum 99.99% Diamond Custom
Serving Regions
Bronze 1 Silver 1 Gold 2 Platinum 3 Diamond Any public region
Hours of Support availability
Bronze Best effort Silver 9x5 Gold 9x7 Platinum 24x7 Diamond 24x7
Response Time - Severity 1
Bronze Best effort Silver 6 hours Gold 3 hours Platinum 1 hours Diamond Custom
Named Customer Success Engineer
Bronze N/A Silver N/A Gold Yes Platinum Yes Diamond Yes+
Client transactions
Bronze 200 per day Silver 2k per day Gold 4K per day Platinum 10K per day Diamond Up to unlimited

We’re running a world-class cloud service

Leveraging the immense power of the cloud, Akeyless Vault Cloud Service is built on top of multiple availability zones, regions and across clouds, to provide enterprise production-grade resiliency and availability.

Akeyless is certified for ISO 27001, GDPR, FIPS and SOC2 type2, and running periodical penetration testing by world-renowned consultants.

We have Zero Knowledge of your secrets and keys.

With our patented technology, named Akeyless DFC (Distributed Fragments Cryptography), we are able to operate any cryptographic operation using fragments of encryption keys, without ever combining the fragments, not even during encryption itself.

One of the key fragments is created independently on the customer side and stored so that Akeyless never has access to it. We simply don’t have all of your key fragments and therefore can’t decrypt your secrets.

Our secret is in our technology, design & people.

Akeyless Vault was built from the ground up, on top of a patented technology, and using the most modern cloud native architecture and software design.

Our proprietary software is built by a constantly growing team of highly talented and experienced engineers, previously working for known vendors, driven by the passion to produce and operate a leading enterprise-grade solution.

Frequently Asked Questions

  • What is considered a Client?

    Clients are applications, services and users. Multiple instances of an application are counted as a single client. Same user using different authentication modes is counted as one.

  • What is considered a Secret?

    A Secret is any form of password, credentials, API-key, token, certificate, encryption key or signing keys, either statically set or dynamically created.

  • What happens if I don’t have network connectity?

    For cases where you’d like to strengthen the service continuity, even when your environment is experiencing temporary internet disconnection, we offer an optional component, Akeyless Gateway, which provides configurable in-memory caching of secrets. Our Gateway is provided as a stateless container, with auto-scaling capabilities and fail-safe mechanisms.

  • Do you support sub-admins (aka multi-tenancy) within my account?

    Oh yes. We even support more than one level of multi-tenancy. Every tenant can define sub-tenants under it, which helps support any organizational structure you’d like. And that’s not all. Though tenants are isolated, you, as a global admin, can decide what objects are shared among your sub-tenants.

Trusted by Market Leaders and Experts

  • "Many organizations are placing management of encryption, identities and secrets as a top priority... As organizations do this, they should also consider deployment of more security controls as SaaS."
  • "Akeyless introduces a unique and innovative approach for Secrets Management… The SaaS availability, ease of use, seamless integration, and security capabilities - with Zero-Trust Encryption - made Akeyless our selected solution."
  • "Akeyless is uniquely positioned to address digital transformation and cloud migration needs… zero-trust, secret management as-a-service, generating increased security, seamless usability and better TCO."
  • "The greatest advantages of Akeyless’ Vault is that it requires zero-deployment, provides automatic migration processes and does not require maintenance efforts. The savings in licensing and infrastructure costs are significant."
  • "Akeyless’ innovative key management technology meets the newest needs of hybrid and multi-cloud cryptographic operations, which ensures a more effective data protection implementation, and meets key regulatory requirements as of today."
  • "By providing frictionless Zero Trust Access via a unified authentication and just-in-time access, Akeyless positions itself as a true PAM 2.0 offering, eradicating the shortcomings of the traditional PAM solutions."
  • "Distributed Fragment Cryptography technology by Akeyless, makes sure that encryption keys are never kept as whole, and never in one-party hands, eliminating the necessity to trust the service provider with your keys."
  • "Credentials, tokens, keys and passwords are among the most sensitive assets of an organization. Akeyless is providing a fresh yet mature unified all-in-one solution that combines several disciplines of DevSecOps, PAM, KMS, and PKI."
  • "I am thrilled to be working with Akeyless on an innovative new approach to secrets management, leveraging zero-trust encryption and delivered as a cloud service."

See the Akeyless Vault in Action