Listing Thumbnail

    Akeyless Secrets Management

     Info
    Sold by: Akeyless 
    Deployed on AWS
    Free Trial
    AWS Free Tier
    Protect and automate access to secrets like credentials, keys, tokens, and API Keys across your DevOps tools and cloud platforms in a unified secrets management platform.
    4.6

    Overview

    Play video

    Akeyless Security is the provider of Akeyless Platform, the vaultless 'secrets management as a service' platform that provides DevOps and Infosec teams with a unified and secure way to manage the entire lifecycle of credentials, certificates and keys used by machine identities in DevOps and cloud environments. The SaaS-based platform is built for hybrid and multi-cloud environments that allows infinite scalability while lowering total cost of ownership. In addition, it provides extensions for secure remote access, password manager, encryption and KMS, making it a comprehensive solution to address secrets sprawl. Built on the patented and FIPS 140-2 certified Distributed Fragments Cryptography (DFC), with zero-knowledge-encryption capabilities, so that even Akeyless can neither access your encryption keys nor decrypt your secrets. Akeyless Platform is built on AWS, and can be deployed alongside AWS Secrets Manager, can enhance EKS cluster security operations with Kubernetes secrets injection, while also supporting AWS Key Management Service for cryptographic key storage. Amazon S3 buckets can be used for consolidating audit logs created by Akeyless Platform. Enterprise customers please contact us at cloudalliance@akeyless.io  to request Private Offer through the Marketplace.

    Highlights

    • Cost efficient platform that does not need dedicated engineering resources to start, scale and operate
    • Enterprise Scale platform that is fast and easy to deploy and maintain
    • 24x7 support that meets and exceeds expectations, including dedicated customer success managers and account managers.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Akeyless Secrets Management

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Cost/12 months
    Clients
    $1,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Submit a ticket via https://www.akeyless.io/submit-a-ticket/  Get the help you need at every stage of your journey.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Infrastructure as Code, Continuous Integration and Continuous Delivery
    Top
    100
    In Monitoring

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    18 reviews
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Cryptographic Architecture
    Built on patented and FIPS 140-2 certified Distributed Fragments Cryptography (DFC) with zero-knowledge-encryption capabilities
    Secrets Lifecycle Management
    Unified management of credentials, certificates, keys, tokens, and API keys across the entire lifecycle for machine identities
    Multi-Cloud and Hybrid Environment Support
    SaaS-based platform designed for hybrid and multi-cloud environments with infinite scalability
    Kubernetes Integration
    Kubernetes secrets injection capability to enhance EKS cluster security operations
    Comprehensive Security Extensions
    Extensions for secure remote access, password management, encryption, and KMS functionality
    Centralized Secrets Management
    Centrally secures, rotates, and manages secrets across multi-cloud and hybrid environments with a unified view across multiple AWS accounts and AWS Secrets Manager instances.
    Multi-Platform Integration
    Offers REST APIs and integrates with a wide range of DevOps tools, container platforms, vulnerability scanners, RPA, and automation tools for credential delivery.
    Secrets Rotation and Lifecycle Management
    Automatically rotates secrets in AWS Secrets Manager and across enterprise environments without requiring changes to developer workflows or applications.
    Audit and Access Control
    Provides centralized control and comprehensive auditing of how applications, DevOps tools, and automation platforms authenticate and access sensitive resources including databases and cloud environments.
    Enterprise-Scale Architecture
    Designed to support massive scalability with data sovereignty requirements for large global enterprises and eliminates vault sprawl across distributed environments.
    Centralized Key Lifecycle Management
    Centralized key lifecycle management with role-based access control to encryption keys and policies across the data security platform.
    Hardware Security Module Integration
    Integration with FIPS 140-2 validated Thales Luna and third-party hardware security modules (HSMs) for secure key storage with highest root of trust.
    Developer-Friendly APIs
    Support for multiple API protocols including REST, KMIP, and NAE XML for easier integration with applications and systems.
    Audit and Compliance Logging
    Enterprise key management activity logs provided in non-repudiatable audit trail that can be forwarded to security information management (SIEM) platforms.
    Multi-Environment Data Discovery and Classification
    Unified management console for discovery, classification, and protection of sensitive data across file systems, databases, applications, containers, big data, and virtualized environments.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    85 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    78%
    21%
    1%
    0%
    0%
    1 AWS reviews
    |
    84 external reviews
    External reviews are from G2 .
    Information Technology and Services

    Highly Secure Service Account Key Management with Centralized Auditing

    Reviewed on Mar 05, 2026
    Review provided by G2
    What do you like best about the product?
    It's multicloud which is beneficial as we operate across the big three. The fact it's a SaaS helps too, as Akeyless manage the infra and we manage the identities.
    What do you dislike about the product?
    Nothing immediately comes to mind. I haven't noticed any glaring issues.
    What problems is the product solving and how is that benefiting you?
    Allows us to be highly secure with our usage of Service Account Keys. Rather than directly generating long lived Keys within cloud platforms directly, they're all created via Akeyless. This allows for a single pane of glass view, easier auditing and we can set maximum rotation periods.
    Xavier M.

    Fragment-Free Architecture and Real-Time Credential Management That Boost Security

    Reviewed on Mar 04, 2026
    Review provided by G2
    What do you like best about the product?
    It’s a great relief to have its master fragment-free architecture, which helps guarantee security. On the other hand, I’d also highlight its excellent ability to manage dynamic credentials in real time.
    What do you dislike about the product?
    It requires an initial adaptation period to master all its identity functionalities
    What problems is the product solving and how is that benefiting you?
    It’s a modern and secure platform. It has benefited me a lot by centralizing multi-cloud security under a single, unified identity scheme, which makes everything feel more consistent and easier to manage.
    reviewer2795433

    Short‑lived secrets have transformed our cloud access and now greatly reduce credential risk

    Reviewed on Jan 14, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My main use case for Akeyless Secrets Management  is using the static and dynamic secrets functionality. Rather than using static keys within cloud platforms such as AWS  or GCP, we use Akeyless Secrets Management  to generate short-lived access credentials to then authenticate to cloud environments.

    We also use Akeyless Secrets Management when integrating with third-party tools. When an integration needs to occur between one of our public clouds and a third-party vendor, you would sometimes have to put in a static key on the third-party tool's side. Rather than using a JSON key created directly on a cloud platform, we create it via Akeyless Secrets Management and then enable automatic rotation and upload that onto the third-party tool provider website. This applies to both code-based and UI-based use cases.

    What is most valuable?

    I appreciate that Akeyless Secrets Management offers the ability for secrets to be automatically rotated. When interacting with it via code, Akeyless Secrets Management automatically rotates secrets to increase security. Additionally, I understand that Akeyless Secrets Management does not store the entire secret in one string on their side. The secret is split across different servers, which is extremely secure.

    The rotation of secrets aspect of Akeyless Secrets Management is excellent. It allows for much higher security and there is a great reduction in potential exploits or attacks to our infrastructure because it is very difficult to get compromised credentials when they rotate so regularly. Akeyless Secrets Management splitting secrets in terms of their storage also means that even if an attacker were to infiltrate Akeyless Secrets Management's infrastructure, it would be extremely difficult if not impossible to get the full credentials. This security is excellent for us and also for our customers.

    Using Akeyless Secrets Management has greatly increased our security posture, which is excellent and definitely reduces the risk of potential attacks or exploits. From a security-specific perspective, this is excellent when looking at things like data security. It has improved our data security posture. In terms of financial governance, if we were to be exploited in cloud environments, costs can very quickly ramp up. Using Akeyless Secrets Management actually saves potential costs as well.

    What needs improvement?

    I do not believe there are any improvements needed for Akeyless Secrets Management. It works excellently for what it aims to do. The UI on Akeyless Secrets Management is also very easy to use, which is important because engineers across a business would use this. It is not just one team that uses it; everyone would use it. Akeyless Secrets Management achieves its aims perfectly.

    For how long have I used the solution?

    I have been using Akeyless Secrets Management for two years.

    What other advice do I have?

    Akeyless Secrets Management was not purchased through the AWS Marketplace . It was purchased directly with the vendor, but it interacts with AWS  because it links with the AWS cloud.

    I would recommend others to use Akeyless Secrets Management. It is a brilliant security platform. It is very easy to use. It does exactly what it says it should. I would highly recommend people to use it.

    I would say the risk reduction of the compromise of long-lived static credentials is over fifty percent, which is excellent because if every static credential is created through Akeyless Secrets Management, it greatly reduces the risk. Arguably it would be somewhere between fifty to ninety-nine percent.

    I have given this product a rating of ten out of ten.

    Information Technology and Services

    Effortless Secret Saving Makes Life Easier

    Reviewed on Nov 17, 2025
    Review provided by G2
    What do you like best about the product?
    Saving Secrets is very easy in Akeyless.
    What do you dislike about the product?
    Accessing secrets from an api and integrating
    What problems is the product solving and how is that benefiting you?
    Previously, misplacing secrets was a significant concern for us. However, by implementing akeyless, we have managed to resolve this issue.
    Design

    Centralized secret management that works

    Reviewed on Aug 27, 2025
    Review provided by G2
    What do you like best about the product?
    Unified Secrets Management. Compliance & Security Posture
    What do you dislike about the product?
    Pricing Transparency. UI & Workflow Navigation
    What problems is the product solving and how is that benefiting you?
    Infrastructure & Maintenance Overhead.
    View all reviews