Constant Contact provides a marketing platform, which consists of multiple products, managed by multiple teams. They were looking for a purpose-built, Enterprise-class solution to secure their secrets.
Constant Contact provides a marketing platform, which consists of multiple products, managed by multiple teams. They were looking for a purpose-built, Enterprise-class solution to secure their secrets.
News
Why Progress Uses Akeyless to Support their Hybrid Multicloud StrategyProgress Software Corporation (Progress) offers software for creating and deploying business applications. Progress is headquartered in Burlington, Massachusetts with offices in 16 countries and employs approximately 2100 people. From an organizational perspective, the company is broken down into different divisions, which have individual responsibilities, including application and digital experience, as well as creating tools and/or […]
Security
DevSec For Scale Podcast Ep 2: Minimum Viable SecurityLet’s be real. Security is not at the top of the priority list for developers… especially at smaller companies that are pushing to get out an MVP as quickly as possible. Well, there is a solution, and it’s called MVS or minimum viable security. This approach lays the groundwork for companies to ensure they build […]
Security
Zero Standing Privileges in Production EnvironmentsIn this demo, VP R&D Ori Mankali gives us a look into a simple application that uses GitLab in which he builds and deploys a Docker image to Docker Hub and uses that to pull the application, which is running on Amazon EKS. The demo will show the initial state of the application and then […]
Security
Why All Organizations Benefit From Centralized Secrets ManagementToday, the surge of automation and containerization can be found in organizations of all sizes. No matter which industry, hybrid multicloud workloads that operate within agile DevOps environments are now central to maintaining a competitive edge, creating great end-user experiences, and increasing employee efficiency. On the other side of the coin, these organizations also still […]
In this video, we walk you through Kubernetes authentication and secrets injection using native Kubernetes constructs, init and sidecar, and the Akeyless Secrets Injection Webhook to fetch secrets from Akeyless Vaultless® Platform into your Kubernetes applications.
Webinar
Securing Infrastructure-as-CodeSecrets Management is a segment of DevSecOps tools and methods that are used to manage digital authentication credentials that include things like passwords, keys, APIs, and tokens for use in applications, services, use access and other restricted IT operations. Thanks to the growth of component-based systems and hybrid environments the number of secrets companies have to manage is exploding and becoming increasingly chaotic. Controlling the chaos requires DevSecOps teams to figure out how to authenticate, validate, assign privileged access and secure identifies for both human and machines as part of automated pipelines.
Security
DevSec For Scale Podcast Ep 1: Startup Security Best PracticesThe DevSec For Scale Podcast and Meetup have arrived! We have a single mission with this community: “Making security a first-class citizen in young and growing companies.” Our first podcast guest is one of our good friends, Dr. Chase Cunningham. Chase has been a great asset as an Advisory Board member and was also a […]
This post was written based on the work of Fahmy Khadiri, Technical Sales Account Manager at Akeyless, in his voice. Introduction In this blog post, I’ll be walking you through Kubernetes authentication and secrets injection using native Kubernetes constructs and the Akeyless Secrets Injection Webhook to fetch secrets from Akeyless Vaultless® Platform into your Kubernetes […]
The sensitive nature of superuser credentials requires frequent password rotation to limit risk. Akeyless allows you to automate the process, without introducing friction to workflows.
DevOps
Securing Privileged User Accounts with Rotated SecretsOverview One of the most sensitive secrets in your organization is without a doubt the credentials for your superuser accounts. These accounts, such as the root account for a Linux server, the Administrator account for a Windows server, or the Admin accounts for a network device, have virtually unlimited privileges. Anyone with the credentials for […]
Learn more about Akeyless Vaultless® Platform, a solution for centrally creating, managing, and securing the lifecycle of secrets.
Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.
Take a self-guided tour of our top features.
See the platformLearn what Akeyless can do for your team.
Talk to an expert