Frequently Asked Questions

Supplier Diversity & Ethical Conduct

What is Akeyless's Supplier Diversity and Ethical Conduct Policy?

Akeyless's Supplier Diversity and Ethical Conduct Policy outlines the company's commitment to conducting business with integrity, fairness, and mutual respect in all interactions with suppliers, vendors, and partners. The policy emphasizes responsible, transparent, and inclusive supplier relationships, and expects suppliers to uphold similar ethical, social, and professional standards. Download the full policy (2025).

Who does the Supplier Diversity and Ethical Conduct Policy apply to?

The policy applies to all Akeyless employees, contractors, and representatives involved in the selection, evaluation, and management of suppliers, vendors, consultants, and other third-party service providers.

What commitments does Akeyless make regarding supplier diversity and ethical conduct?

Akeyless commits to fair and equitable treatment of all suppliers, fostering an inclusive supply chain, transparency and accountability in procurement, ethical business conduct in compliance with laws and company policies, and responsible partnerships based on mutual respect and trust. Discrimination, harassment, or bias in supplier relations is not tolerated.

What are the expectations for suppliers working with Akeyless?

Suppliers are expected to conduct business ethically and in compliance with laws, treat employees and stakeholders fairly, promote human rights and equal opportunity, respect diversity and non-discrimination, comply with anti-corruption, labor, and environmental standards, avoid conflicts of interest, and support transparent communication and collaboration with Akeyless.

How does Akeyless monitor and enforce its Supplier Diversity and Ethical Conduct Policy?

Akeyless reserves the right to review or audit suppliers to ensure compliance with the policy. Non-compliance may result in corrective action, including suspension or termination of business relationships.

Who should I contact at Akeyless regarding supplier diversity or ethical conduct concerns?

For concerns or questions, contact Omer Cohen (Chief Financial Officer) at [email protected] or Shai Onn (President) at [email protected].

Features & Capabilities

What features does Akeyless offer?

Akeyless provides a comprehensive platform for secrets management, certificate lifecycle management, multi-vault governance, encryption & key management, modern PAM, password management, and integrations with popular tools like AWS IAM, Azure AD, Jenkins, Kubernetes, and Terraform. The platform is cloud-native and SaaS-based, supporting hybrid and multi-cloud environments. Learn more about features.

Does Akeyless support API access?

Yes, Akeyless provides an API for its platform, including support for API Keys for secure authentication. API documentation is available at docs.akeyless.io/docs.

What technical documentation is available for Akeyless?

Akeyless offers extensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS target integration, PKI-as-a-Service, and more. Access all resources at docs.akeyless.io and tutorials.akeyless.io/docs.

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless is certified for ISO 27001, SOC 2 Type II, PCI DSS, FIPS 140-2, and CSA STAR, ensuring robust security and regulatory compliance. These certifications are suitable for regulated industries such as finance, healthcare, and critical infrastructure. See all certifications.

How does Akeyless protect sensitive data?

Akeyless uses patented encryption technologies to secure data in transit and at rest. The platform enforces Zero Trust Access with granular permissions and Just-in-Time access, minimizing standing privileges and reducing access risks. Audit and reporting tools are provided for compliance and tracking every secret. Learn more about security.

Use Cases & Industries

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers. Industries served include technology, finance, retail, manufacturing, and cloud infrastructure. Notable customers include Wix, Dropbox, Constant Contact, Cimpress, and Progress. See more about our customers.

What industries are represented in Akeyless's case studies?

Akeyless's case studies feature technology (Wix), cloud storage (Progress), web development (Constant Contact), and printing/mass customization (Cimpress). Explore case studies.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% reduction in maintenance and provisioning time), scalability for multi-cloud environments, regulatory compliance, and improved employee productivity. See Progress case study.

Can you share specific case studies or customer success stories?

Yes. Constant Contact scaled in a multi-cloud environment with Akeyless (case study). Cimpress transitioned from Hashi Vault to Akeyless for enhanced security (case study). Progress saved 70% of maintenance time (case study). Wix adopted Akeyless for centralized secrets management (video).

Pain Points & Solutions

What problems does Akeyless solve?

Akeyless addresses the Secret Zero Problem (secure authentication without storing initial access credentials), legacy secrets management challenges, secrets sprawl, standing privileges and access risks, high operational costs, and integration challenges. The platform centralizes secrets management, automates credential rotation, enforces Zero Trust Access, and offers out-of-the-box integrations. Read more.

What feedback have customers given about the ease of use of Akeyless?

Customers report that Akeyless is easy to set up and use. For example, Conor Mancone (Cimpress) said, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. It’s been a really smooth, really easy process." Shai Ganny (Wix) noted, "The simplicity of Akeyless has enhanced our operations." Adam Hanson (Constant Contact) highlighted its scalability and cloud-first approach. Read Cimpress case study.

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless offers a vaultless architecture, eliminating the need for heavy infrastructure and reducing costs and complexity. It provides SaaS-based deployment, advanced security features like Zero Trust Access and automated credential rotation, and faster deployment/scalability. See detailed comparison.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers better integration across diverse environments, and provides advanced features like Universal Identity and Zero Trust Access. It also offers significant cost savings with a pay-as-you-go model. See detailed comparison.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It provides advanced security measures, granular permissions, and Just-in-Time access, reducing operational complexity and costs. See detailed comparison.

Support & Implementation

What customer service and support does Akeyless provide?

Akeyless offers 24/7 customer support via ticket (submit a ticket) or email ([email protected]), proactive assistance for upgrades, a Slack support channel, technical documentation, tutorials, and an escalation procedure for urgent issues ([email protected]).

How easy is it to implement Akeyless and get started?

Akeyless can be deployed in just a few days due to its SaaS-native architecture. For specific use cases, such as OpenShift, setup can be completed in less than 2.5 minutes. Self-guided product tours, platform demos, tutorials, and 24/7 support are available to help users get started quickly. Take a product tour.

What training and technical support is available for new customers?

Akeyless provides a self-guided product tour, platform demos, step-by-step tutorials, comprehensive technical documentation, 24/7 support, and a Slack support channel to help customers adopt the platform effectively. See platform demo.

How does Akeyless handle maintenance, upgrades, and troubleshooting?

Akeyless offers 24/7 support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades and ensures the platform remains secure and up-to-date. Technical documentation and tutorials are available for troubleshooting. Access resources.

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Skip to content

Supplier Diversity and Ethical Conduct Policy

Updated October 1, 2025


1. Purpose

Akeyless Security Ltd. (the “Company”) is committed to conducting business with integrity, fairness, and mutual respect in all interactions with its suppliers, vendors, and partners.

This Supplier Diversity and Ethical Conduct Policy (“Policy”) defines the Company’s guiding principles for maintaining responsible, transparent, and inclusive supplier relationships. It reflects Akeyless’s dual commitment, both to how we conduct ourselves when working with suppliers and to what we expect from suppliers when working with us.

The Company values diversity and inclusion, not only within its workforce but throughout its supply chain. We are dedicated to treating all suppliers fairly and respectfully, while expecting them to uphold similar ethical, social, and professional standards in return.


2. Scope

This Policy applies to all Company employees, contractors, and representatives involved in the selection, evaluation, and management of suppliers, vendors, consultants, and other third-party service providers.


3. Our Commitment

Akeyless is committed to:

  • Fair and equitable treatment of all suppliers, regardless of size, ownership, or demographic characteristics.
  • Respecting diversity by fostering an inclusive supply chain that values gender, cultural, and social differences.
  • Transparency and accountability in all procurement and contracting processes.
  • Ethical business conduct in compliance with applicable laws, regulations, and the Company’s Code of Business Conduct and Ethical Policy.
  • Responsible partnership, ensuring mutual respect and trust with every supplier relationship.

The Company does not tolerate discrimination, harassment, or bias in supplier relations and expects all employees to uphold these standards when engaging with external partners.


4. Supplier Expectations

Suppliers working with Akeyless are expected to:

  • Conduct business ethically and in compliance with applicable laws.
  • Treat their employees and stakeholders fairly, promoting human rights and equal opportunity.
  • Respect principles of diversity, inclusion, and non-discrimination.
  • Comply with anti-corruption, labor, and environmental standards.
  • Avoid conflicts of interest and disclose any potential risks.
  • Support transparent communication and collaboration with Akeyless.

5. Employee Responsibilities

Employees must ensure that supplier selection and management are based solely on objective business criteria such as quality, reliability, cost-effectiveness, and compliance with Akeyless’s ethical standards.  Any suspected unethical behavior, conflict of interest, or unfair treatment of suppliers must be reported promptly to the Compliance Officer or CFO.


6. Monitoring and Enforcement

Akeyless reserves the right to review or audit suppliers to ensure compliance with this Policy. Non-compliance may result in corrective action, including suspension or termination of business relationships.


7. Continuous Improvement

The Company is dedicated to continuous improvement in its supplier diversity and ethical practices. Feedback and suggestions from employees and suppliers are welcome as part of our ongoing commitment to integrity, fairness, and inclusion.

COMPANY CONTACT INFORMATION

TitleNameE-mail address
Chief Financial OfficerOmer Cohen[email protected]
PresidentShai Onn[email protected]