Frequently Asked Questions

Security & Compliance

What security and compliance certifications does Akeyless hold?

Akeyless is certified for ISO 27001, FIPS 140-2, CSA STAR, SOC 2 Type II, and PCI DSS. These certifications demonstrate Akeyless's commitment to robust security and regulatory compliance for industries such as finance, healthcare, and critical infrastructure. For more details, visit our Trust Center.

How does Akeyless protect customer data?

Akeyless uses patented encryption technology (DFC™), which is NIST FIPS 140-2 compliant, to secure data in transit and at rest. The platform enforces granular permissions, Just-in-Time access, and provides comprehensive audit logs and SIEM integration for monitoring and compliance. For more information, see Data Protection Measures.

How does Akeyless ensure business continuity and disaster recovery?

Akeyless maintains an Incident Response and Business Continuity Plan, a Data Backup and Snapshot Policy, and multi-region deployments. Databases are replicated across multiple regions and cloud platforms, ensuring high availability and low latency. Disaster recovery is supported by multi-region read replicas, versioning, and snapshots. The platform continues to operate even if a zone or region is unavailable.

How does Akeyless ensure application and network security?

Akeyless secures its platform at the database, application, and infrastructure levels. The company conducts regular penetration tests, uses automated vulnerability scanning tools, and mitigates identified risks according to severity. All code is inspected for security from development through deployment.

Are Akeyless business practices secure?

Akeyless enforces strict internal security policies, reviewed and updated annually. All employees and contractors undergo background checks, sign confidentiality agreements, and complete annual security training. Developers receive secure development training to ensure product security.

How does Akeyless ensure security with third parties?

Akeyless uses cloud service providers with best-in-class security. Its patented DFC™ technology (NIST FIPS 140-2 validated) ensures that neither Akeyless nor its cloud providers have access to customer secrets and keys, providing proactive protection against insider threats. Learn more here.

Where can I get more information about Akeyless's security and compliance?

You can contact Akeyless at [email protected] or visit the Trust Center for detailed insights into security practices, certifications, and compliance measures.

Features & Capabilities

What are the key features of Akeyless?

Akeyless offers Vaultless Architecture, Universal Identity (solving the Secret Zero Problem), Zero Trust Access, automated credential rotation, centralized secrets management, and out-of-the-box integrations with AWS IAM, Azure AD, Jenkins, Kubernetes, and Terraform. The platform is cloud-native and supports hybrid and multi-cloud environments. Learn more.

Does Akeyless provide an API?

Yes, Akeyless provides a robust API for its platform. API documentation and guides are available at our API documentation page. Akeyless supports API Keys for secure authentication for both human and machine identities.

What technical documentation is available for Akeyless?

Akeyless offers comprehensive technical documentation, including platform overviews, password management, Kubernetes secrets management, AWS target integration, PKI-as-a-Service, and more. Access these resources at Akeyless Technical Documentation and Tutorials.

Competition & Comparison

How does Akeyless compare to HashiCorp Vault?

Akeyless uses a SaaS-based, vaultless architecture, eliminating the need for heavy infrastructure and reducing operational overhead. It offers advanced security features like Universal Identity and Zero Trust Access, and supports faster deployment and easier scalability. For a detailed comparison, visit Akeyless vs HashiCorp Vault.

How does Akeyless compare to AWS Secrets Manager?

Akeyless supports hybrid and multi-cloud environments, offers out-of-the-box integrations with tools like Jenkins and Kubernetes, and provides advanced features such as Universal Identity and Zero Trust Access. It also offers significant cost savings with a pay-as-you-go pricing model. For more, see Akeyless vs AWS Secrets Manager.

How does Akeyless compare to CyberArk Conjur?

Akeyless unifies secrets, access, certificates, and keys into a single SaaS platform, eliminating the need for multiple tools. It provides advanced security measures like Zero Trust Access and vaultless architecture, reducing operational complexity and costs. For a detailed comparison, visit Akeyless vs CyberArk.

Use Cases & Benefits

Who can benefit from using Akeyless?

Akeyless is designed for IT security professionals, DevOps engineers, compliance officers, and platform engineers across industries such as technology, finance, retail, manufacturing, and cloud infrastructure. Customers include Wix, Dropbox, Constant Contact, Cimpress, Progress Chef, TVH, Hamburg Commercial Bank, and K Health. Learn more.

What core problems does Akeyless solve?

Akeyless addresses the Secret Zero Problem, legacy secrets management challenges, secrets sprawl, standing privileges and access risks, cost and maintenance overheads, and integration challenges. The platform centralizes secrets management, automates credential rotation, and enforces Zero Trust Access, improving security and operational efficiency. See case studies.

What business impact can customers expect from using Akeyless?

Customers can expect enhanced security, operational efficiency, cost savings (up to 70% in maintenance and provisioning time), scalability for multi-cloud environments, regulatory compliance, and improved employee productivity. Read the Progress case study.

Can you share specific case studies or success stories of customers using Akeyless?

Yes. Constant Contact scaled in a multi-cloud, multi-team environment using Akeyless (case study). Cimpress transitioned from Hashi Vault to Akeyless for enhanced security (success story). Progress saved 70% of maintenance and provisioning time (case study). Wix adopted Akeyless for centralized secrets management and Zero Trust Access (video).

What feedback have customers shared about the ease of use of Akeyless?

Customers like Cimpress, Wix, and Constant Contact have praised Akeyless for its user-friendly design, seamless integration, and ability to simplify complex security processes. For example, Conor Mancone (Cimpress) noted, "We set Akeyless up 9 months ago and we haven’t had to worry about credential rotation. It’s been a really smooth, really easy process." (Cimpress Case Study)

Technical Requirements & Implementation

How long does it take to implement Akeyless, and how easy is it to start?

Akeyless can be deployed in just a few days due to its SaaS-native architecture. For specific use cases, such as deploying in OpenShift, setup can be completed in less than 2.5 minutes. The platform offers self-guided product tours, demos, tutorials, and 24/7 support to ensure a smooth onboarding experience. Start here.

What training and technical support is available to help customers get started?

Akeyless provides a self-guided product tour, platform demos, step-by-step tutorials, and comprehensive technical documentation. 24/7 support is available via ticket, email ([email protected]), and Slack. Proactive assistance is offered for upgrades and troubleshooting. Explore resources.

How does Akeyless handle maintenance, upgrades, and troubleshooting?

Akeyless offers 24/7 customer support for maintenance, upgrades, and troubleshooting. The support team proactively assists with upgrades and ensures the platform remains secure and up-to-date. Technical documentation and tutorials are available to help customers resolve issues independently. For unresolved requests, customers can escalate via [email protected].

Product Information

What is Akeyless?

Akeyless is a cloud-native SaaS platform for secrets management, identity security, and encryption. It provides a unified solution for managing secrets, access, certificates, and keys, with advanced security features and integrations for hybrid and multi-cloud environments. Learn more.

What industries are represented in Akeyless's case studies?

Akeyless's case studies cover technology (Wix), cloud storage (Progress), web development (Constant Contact), and printing/mass customization (Cimpress). These examples showcase Akeyless's versatility across diverse sectors. See case studies.

Skip to content

Trust Center

Security Is The Heart Of Our Business

Akeyless puts security and compliance at the heart of its service. The confidentiality, integrity and availability of our customers’ data is our top priority.

Compliance with International standards

Akeyless is proud to maintain world-class compliance and security standards, including FIPS 140-2, SOC 2 Type IIISO 27001, PCI DSS compliance and DORA.

Enable your security audits and initiatives

Using Akeyless, encrypt in motion (and at rest) with the most updated protocols (TLS 1.2 and up). Akeyless also provides comprehensive audit logs and SIEM integration for your own monitoring and compliance initiatives. Through your IDP, use Akeyless to inherit two-factor authentication for reinforced security across your organization.

Built into our DNA

Akeyless is built on a patented encryption technology, DFC™, which is NIST FIPS 140-2 compliant. Designed to keep ownership of data in your hands, this technology backs all encryption and decryption of data in Akeyless. Rest easy knowing your data is safe.

Security & Reliability at the core

Akeyless has implemented technical, physical and administrative security measures to protect our customers’ data.  Our operations are regularly audited to ensure that we meet the highest security standards. For more information, see our Data Protection Measures.

We have also built Akeyless to be fortified against uncertainty. When the inevitable happens, we want our customers to keep the lights on. By spanning our infrastructure across multiple cloud platforms, regions, and availability zones, our platform is highly available and reliable.

Report a Vulnerability

Akeyless  maintains a bug bounty program and investigates all reported vulnerabilities and bugs.

Report a bug or vulnerability here.

FAQ

Akeyless has an Incident Response and Business Continuity Plan that allows the company to react to incidents in a timely manner and be prepared for anything that might happen. Akeyless also maintains a Data Backup and Snapshot Policy with restoration capabilities in common industry timelines. Databases are replicated across multi regions and multi cloud operations.

In addition, Akeyless is deployed on multi-availability zones and multi-regions. When a zone or an entire region is not functioning, Akeyless will continue to operate. The multi-region deployments are used for a Geolocation based policy, which ensures high availability and latency.

For Disaster Recovery, Akeyless uses inherent features like multi-region read replicas, versioning, and snapshots to ensure high availability of customer’s data.

Akeyless ensures security at the database, application, and infrastructure levels of the product.

From day one, Akeyless develops software with security in mind. From the developer who writes the code to the automated tools that scan for vulnerabilities, every piece of code is inspected.

In addition, Akeyless regularly conducts penetration tests to identify gaps in either the security of its application and its infrastructure. Any gaps that are identified are mitigated according to their level of risk and retested.

Akeyless has developed a set of security policies to dictate the way security is implemented internally. All policies are reviewed and updated annually to the latest security practices.

All Akeyless employees and contractors must pass background checks and sign a confidentiality agreement. When they begin working at Akeyless, they undergo security training, which they must renew at least once a year. In addition, developers go through a secure development training to ensure the security of the code and resulting products.

Akeyless uses cloud service providers with best-in-class security, ensuring that no third party will increase the level of information security risk at Akeyless.

In addition, the patented Akeyless NIST FIPS 140-2 validated DFC™ technology provides proactive insider threat attack protection since neither Akeyless nor the cloud service providers have access to customer secrets and keys. Learn more here.

We’re happy to answer any questions you have at [email protected].

Experience the Unified Secrets & Machine Identity Platform