Listing Thumbnail

    Akeyless Secrets Management

     Info
    Sold by: Akeyless 
    Deployed on AWS
    Free Trial
    AWS Free Tier
    Akeyless secures AI, machine, and human identities with a unified platform that eliminates long-lived secrets, enforces least-privilege access, and delivers ephemeral, policy-based credentials.
    4.6

    Overview

    Play video

    Akeyless Identity Security Platform secures AI agents, machines, and human identities across hybrid and multi-cloud environments. It provides a unified control plane for access, credentials, and identity lifecycle, eliminating reliance on long-lived secrets while enforcing least-privilege access and real-time governance.

    The platform combines:

    -Secrets management to centrally manage and rotate credentials

    -Multi-Vault Governance to unify visibility and control across AWS and third-party vaults

    -Privileged access management with just-in-time, least-privilege access

    -Certificate lifecycle management to automate issuance, renewal, and rotation

    -Enterprise password manager to securely manage workforce credentials

    -AI agent identity security to secure autonomous agents with ephemeral, scoped access

    All capabilities operate through a single policy and audit framework, helping eliminate credential sprawl while maintaining consistent governance across environments.

    Akeyless secures AI agents without embedding credentials in code, prompts, or workflows. Instead of static API keys or tokens, agents receive ephemeral, policy-bound access only when needed. The platform enforces intent-aware control by evaluating requested actions before access is granted, issuing task-scoped, short-lived credentials, and continuously inspecting execution. This ensures every interaction is governed, auditable, and traceable from prompt to outcome.

    The Akeyless platform is FIPS 140-3 validated and powered by patented Distributed Fragments Cryptography (DFC) and a zero-knowledge architecture, ensuring encryption keys and secrets are never fully assembled or accessible, even to Akeyless.

    Akeyless is built on AWS and integrates natively with core services. It can be deployed alongside AWS Secrets Manager, extend Amazon EKS security with Kubernetes secrets injection, and support AWS Key Management Service (KMS) for cryptographic operations and key storage. Audit logs can be centralized in Amazon S3 for visibility and compliance. Enterprise customers can contact cloudalliance@akeyless.io  to request a Private Offer through AWS Marketplace.

    Highlights

    • Cost efficient platform that does not need dedicated engineering resources to start, scale and operate
    • Enterprise Scale platform that is fast and easy to deploy and maintain
    • 24x7 support that meets and exceeds expectations, including dedicated customer success managers and account managers.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Akeyless Secrets Management

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Cost/12 months
    Clients
    $1,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Submit a ticket via https://www.akeyless.io/submit-a-ticket/  Get the help you need at every stage of your journey.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Infrastructure as Code, Continuous Integration and Continuous Delivery
    Top
    100
    In Monitoring

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    18 reviews
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Secrets Management and Rotation
    Centrally manages and rotates credentials across hybrid and multi-cloud environments with automated lifecycle management
    Privileged Access Management
    Provides just-in-time, least-privilege access with intent-aware control that evaluates requested actions before granting access and issues task-scoped, short-lived credentials
    Multi-Vault Governance
    Unifies visibility and control across AWS and third-party vaults through a single policy and audit framework
    Cryptographic Security
    FIPS 140-3 validated platform powered by Distributed Fragments Cryptography (DFC) and zero-knowledge architecture that ensures encryption keys and secrets are never fully assembled or accessible
    AI Agent Identity Security
    Secures autonomous agents with ephemeral, policy-bound access without embedding credentials in code, prompts, or workflows, with continuous execution inspection and audit trails
    Centralized Secrets Management
    Centrally secures, rotates, and manages secrets across multi-cloud and hybrid environments with a unified view across multiple AWS accounts and AWS Secrets Manager instances.
    Multi-Platform Integration
    Offers REST APIs and integrates with a wide range of DevOps tools, container platforms, vulnerability scanners, RPA, and automation tools for credential delivery.
    Secrets Rotation and Lifecycle Management
    Automatically rotates secrets in AWS Secrets Manager and across enterprise environments without requiring changes to developer workflows or applications.
    Audit and Access Control
    Provides centralized control and comprehensive auditing of how applications, DevOps tools, and automation platforms authenticate and access sensitive resources including databases and cloud environments.
    Enterprise-Scale Architecture
    Designed to support massive scalability with data sovereignty requirements for large global enterprises and eliminates vault sprawl across distributed environments.
    Centralized Key Lifecycle Management
    Centralized key lifecycle management with role-based access control to encryption keys and policies across the data security platform.
    Hardware Security Module Integration
    Integration with FIPS 140-2 validated Thales Luna and third-party hardware security modules (HSMs) for secure key storage with highest root of trust.
    Developer-Friendly APIs
    Support for multiple API protocols including REST, KMIP, and NAE XML for easier integration with applications and systems.
    Audit and Compliance Logging
    Enterprise key management activity logs provided in non-repudiatable audit trail that can be forwarded to security information management (SIEM) platforms.
    Multi-Environment Data Discovery and Classification
    Unified management console for discovery, classification, and protection of sensitive data across file systems, databases, applications, containers, big data, and virtualized environments.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    90 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    77%
    22%
    1%
    0%
    0%
    2 AWS reviews
    |
    88 external reviews
    External reviews are from G2 .
    DeepakReddy

    Centralized secret management has improved multi-cloud security and automated key rotation

    Reviewed on May 15, 2026
    Review from a verified AWS customer

    What is our primary use case?

    The main use case is to manage our secrets, to secure machine credentials, API keys, certificates or tokens, and SSH credentials and encryption keys. All of these are secured in hybrid and multi-cloud environments through this tool.

    Generally, I fit Akeyless Secrets Management  into CI/CD pipelines. I have a lot of CI/CD pipelines and many cloud environments in AWS , Azure , and GCP . I manage all API keys and encryption keys through Akeyless Secrets Management . Akeyless Secrets Management offers multiple features including automated key rotation. There is a feature called Distributed Fragment Cryptography, which is a patented Zero-Knowledge encryption architecture provided by Akeyless Secrets Management. This is the main use case of Akeyless Secrets Management.

    What is most valuable?

    One thing I want to say about Akeyless Secrets Management is that many other secret management providers are available, but Akeyless Secrets Management helps us because it has a feature called automated secret rotation. This automated secret rotation automatically triggers a workflow to our hybrid cloud or cloud provider to rotate the secrets on a long-term basis, such as every three months or six months. This ensures the security of our organization better. This is a security best practice generally used in many organizations, but they implement it through their own scripts and CI/CD scripts. Now, with Akeyless Secrets Management, I do not have to do that. Akeyless Secrets Management provides this by default. It has helped us a lot because it reduces overhead for our organization.

    The features mainly include that Akeyless Secrets Management supports multi-cloud and hybrid environments. It has a Universal Secrets Connector and can connect with other secret managers. It offers good compliance, automated secret rotation, temporary credentials, and dynamic secrets options. The main standout feature is the Zero-Knowledge architecture.

    Automated secret rotation stands out most for me. This significantly lowers my manual effort. Without manual intervention, it is automated. Without manual overhead, it solves many issues.

    What needs improvement?

    I sometimes feel that there are documentation gaps in Akeyless Secrets Management. The documentation could be more detailed for advanced integrations and troubleshooting.

    Some organizations feel that there is a trust concern because the secrets are stored in Akeyless Secrets Management and it is not open-sourced. It is completely closed-source. If something goes wrong or someone hacks Akeyless Secrets Management, there is a huge drawback. These are concerns my organization and many other organizations are facing.

    The UI/UX could be better on the homepage and many other pages. Pricing transparency should also be improved. The pricing should include discounted pricing for regular customers or regular enterprise customers.

    For how long have I used the solution?

    I have been using Akeyless Secrets Management for around one year.

    What do I think about the scalability of the solution?

    Akeyless Secrets Management's scalability is very good. As of now, I have not experienced any issues.

    How are customer service and support?

    The customer support is good, but it is somewhat slower compared to other support systems. It could be faster.

    Which solution did I use previously and why did I switch?

    Before Akeyless Secrets Management, I used many other secret managers including in-built secret managers in AWS , AWS Vault, and HashiCorp Vault . Before that, I had to do it manually. With Akeyless Secrets Management, I was able to rotate it very quickly. The efficiency I can report is that around 40% to 50% of the efforts are not wasted in secret management.

    Previously, I was using HashiCorp Vault  and AWS Secret  Manager. There were many issues with HashiCorp Vault and AWS Secret  Manager, such as the lack of automated secret rotation and many compliance threats attached to those platforms. This is why I switched to Akeyless Secrets Management.

    What was our ROI?

    The metric is based on two or three factors including the time saved and the number of manual tasks reduced, as well as the before and after time. Based on those metrics, my organization's efficiency improvement is 40%.

    Which other solutions did I evaluate?

    HashiCorp Vault and AWS Secret Manager were the options I evaluated, but I did not get the results I was looking for. They do not have automated secret rotation, and they do not have a Zero-Knowledge architecture or this cryptographic design. Akeyless Secrets Management stands out because it combines SaaS simplicity with a Zero-Knowledge cryptographic design, reducing operational overhead without fully sacrificing control.

    What other advice do I have?

    The advice I will give to anyone looking into using Akeyless Secrets Management is to first evaluate what tool you need according to your organization's needs. Understand  your organization's need and determine why you need this tool and whether it is necessary. Ask these questions and then choose any tool, not only this tool, but these questions need to be asked beforehand. Once you ask yourself those questions, then you will be confident that you need to use this tool. Always evaluate alternative options as well.

    Use Akeyless Secrets Management as a temporary tool, not a permanent tool. Store a backup of your secrets somewhere. You should not completely rely on Akeyless Secrets Management because if Akeyless Secrets Management fails, everything fails due to a single point of failure. If you have a good backup, you will always be better positioned. These are the suggestions I would give. I gave this product a rating of 8.5 out of 10.

    Sabari S.

    Effortless Security with Seamless Integration

    Reviewed on Mar 26, 2026
    Review provided by G2
    What do you like best about the product?
    I use Akeyless Identity Security Platform to retrieve secrets that are automatically rotated, which helps with storing passwords in code and enhancing security. I really like the implementation ease and security it offers. This platform allows organizations to adopt more secure practices by not keeping passwords in config files, preventing password leaks. Everything works well with it, and the initial setup was straightforward even though it required some coding to integrate.
    What do you dislike about the product?
    Nothing as such deserving dislike
    What problems is the product solving and how is that benefiting you?
    I use Akeyless Identity Security Platform for retrieving secrets with automatic rotation and storing passwords securely, which enhances security by preventing password leaks.
    Avijit K.

    Effortless Setup, Needs Enhanced Features

    Reviewed on Mar 26, 2026
    Review provided by G2
    What do you like best about the product?
    I like that the Akeyless Identity Security Platform has an easy-to-understand architecture and the initial setup is easy. There's no overhead of maintaining local infrastructure, and it saves time and money by allowing us to bring Akeyless onboard and retire our previous PAM tool. The free training, documentation, and guidance from the Akeyless team made it convenient to deal with initial challenges.
    What do you dislike about the product?
    There are many such things, a few of them are - no desktop client for Windows still available, the plugin and the web interface have some issues, and some features are still not available as requested or as per industry standard. We put suppose cases and feature requests and it would be great if those cases were taken care of quickly. Some may take time, which we understand, but no SLA it seems. It would be better to deliver a request within a month or at least within a quarter.
    What problems is the product solving and how is that benefiting you?
    I use Akeyless Identity Security Platform to store and rotate secrets, which saves us time and money. It simplifies periodic rotation of service account secrets, helping us consolidate tools by offering an easier setup without infrastructure maintenance overhead.
    Dennis B.

    Easy, Plug-and-Play Experience

    Reviewed on Mar 25, 2026
    Review provided by G2
    What do you like best about the product?
    Easy use of the product basicly plug and play
    What do you dislike about the product?
    Sometimes we have issues with the software overlay with the password fields and it is then hard to see your password in the field you are typing in
    What problems is the product solving and how is that benefiting you?
    Quicker roll out of these features some of your competitors are slower in rolling out their software and ease of use
    Financial Services

    Zero-Knowledge Security with Strong Cryptography and Advanced RBAC

    Reviewed on Mar 25, 2026
    Review provided by G2
    What do you like best about the product?
    Zero knowledge Security and strong cryptography
    Advance RBAC and access controls
    Focus mainly on machine, workload and non human identities (NHI)
    What do you dislike about the product?
    Some minor glitches on Akeyless UI which can be improved based on feedback.
    What problems is the product solving and how is that benefiting you?
    Main issue it is helping to solve is the scattered non human identities presence in infrastructure will be managed centrally using Akeyless Security Platform.

    Latency on getting the secrets is vey low.

    Customer Support is on par as technical team is available to support with best solution.
    View all reviews