
Unified identity security for machines, AI agents, and humans in the AI era.
Visit WebsitePros
Cons
Ratings aggregated from independent review platforms. Learn more
Free
Contact us
No reviews yet. Be the first to review Akeyless!
Top alternatives based on features, pricing, and user needs.
Akeyless utilizes Distributed Fragments Cryptography™ (DFC) to protect every secret and key. This patented technology ensures that customer data remains secure and encrypted with zero-knowledge assurance.
Pure SaaS offers a fully cloud-managed solution for rapid deployment and minimal operational overhead. Hybrid SaaS combines the benefits of SaaS with on-premise gateways and Zero-Knowledge encryption, allowing customers to control their secrets and identity data within their private infrastructure for compliance and regulatory needs.
Clients are defined as human users, applications, or servers that initiate a remote session with Akeyless services. Multiple instances of the same application or a single user with multiple authentication methods are each counted as one client, with the total number of distinct clients tracked monthly.
For Kubernetes Secrets, a Connector license covers one Kubernetes cluster with up to 10 namespaces. An additional connector license is required for every subsequent block of up to 10 namespaces beyond the initial 10.
Akeyless counts certificates based on the number of valid (non-expired) digital certificates managed through its CLM service over the contract year. Customers purchase an annual package, and the maximum number of active certificates at any point must not exceed this quota.
Transactions encompass discrete interactions involving cryptographic keys, such as key generation, retrieval, rotation, deletion, encryption operations, decryption operations, and access control modifications. These interactions are tracked monthly to determine usage.
Source: akeyless.io