Read how the Progress team utilizes Akeyless Vaultless® Platform to fight secret sprawl in a multicloud environment.
Read how the Progress team utilizes Akeyless Vaultless® Platform to fight secret sprawl in a multicloud environment.
News | Security
How Your Vendor’s Security Practices Impact Your BusinessAkeyless puts security at the heart of its service. The confidentiality, integrity, and availability of our customer’s data are our top priorities. We understand (and as a security company, we encourage) that our customers do not blindly trust their vendors. Engaging with any vendor that handles your most sensitive data and infrastructure, requires a high […]
Constant Contact provides a marketing platform, which consists of multiple products, managed by multiple teams. They were looking for a purpose-built, Enterprise-class solution to secure their secrets.
News
Why Progress Uses Akeyless to Support their Hybrid Multicloud StrategyProgress Software Corporation (Progress) offers software for creating and deploying business applications. Progress is headquartered in Burlington, Massachusetts with offices in 16 countries and employs approximately 2100 people. From an organizational perspective, the company is broken down into different divisions, which have individual responsibilities, including application and digital experience, as well as creating tools and/or […]
Security
DevSec For Scale Podcast Ep 2: Minimum Viable SecurityLet’s be real. Security is not at the top of the priority list for developers… especially at smaller companies that are pushing to get out an MVP as quickly as possible. Well, there is a solution, and it’s called MVS or minimum viable security. This approach lays the groundwork for companies to ensure they build […]
Security
Zero Standing Privileges in Production EnvironmentsIn this demo, VP R&D Ori Mankali gives us a look into a simple application that uses GitLab in which he builds and deploys a Docker image to Docker Hub and uses that to pull the application, which is running on Amazon EKS. The demo will show the initial state of the application and then […]
Security
Why All Organizations Benefit From Centralized Secrets ManagementToday, the surge of automation and containerization can be found in organizations of all sizes. No matter which industry, hybrid multicloud workloads that operate within agile DevOps environments are now central to maintaining a competitive edge, creating great end-user experiences, and increasing employee efficiency. On the other side of the coin, these organizations also still […]
In this video, we walk you through Kubernetes authentication and secrets injection using native Kubernetes constructs, init and sidecar, and the Akeyless Secrets Injection Webhook to fetch secrets from Akeyless Vaultless® Platform into your Kubernetes applications.
Webinar
Securing Infrastructure-as-CodeSecrets Management is a segment of DevSecOps tools and methods that are used to manage digital authentication credentials that include things like passwords, keys, APIs, and tokens for use in applications, services, use access and other restricted IT operations. Thanks to the growth of component-based systems and hybrid environments the number of secrets companies have to manage is exploding and becoming increasingly chaotic. Controlling the chaos requires DevSecOps teams to figure out how to authenticate, validate, assign privileged access and secure identifies for both human and machines as part of automated pipelines.
Security
DevSec For Scale Podcast Ep 1: Startup Security Best PracticesThe DevSec For Scale Podcast and Meetup have arrived! We have a single mission with this community: “Making security a first-class citizen in young and growing companies.” Our first podcast guest is one of our good friends, Dr. Chase Cunningham. Chase has been a great asset as an Advisory Board member and was also a […]
This post was written based on the work of Fahmy Khadiri, Technical Sales Account Manager at Akeyless, in his voice. Introduction In this blog post, I’ll be walking you through Kubernetes authentication and secrets injection using native Kubernetes constructs and the Akeyless Secrets Injection Webhook to fetch secrets from Akeyless Vaultless® Platform into your Kubernetes […]
The sensitive nature of superuser credentials requires frequent password rotation to limit risk. Akeyless allows you to automate the process, without introducing friction to workflows.
Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.
Take a self-guided tour of our top features.
See the platformLearn what Akeyless can do for your team.
Talk to an expert