Akeyless Platform Features
What are the features of Akeyless Platform?
Usability & Access
- Quick Login
- Browser Extension
- Multi-Device Use
- Admin Management
Security Measures
- Password Generator
- Two-Factor Authentication
Functionality
- Durability
- Automation
- Role-based security
- Audit trail
- Cental dashboard
- Universal approach
Administration
- Policy, User, and Role Management
Availability
- Scalability
Reporting
- Audit log
Top Rated Akeyless Platform Alternatives
Akeyless Platform Categories on G2
Filter for Features
Usability & Access
Quick Login | Based on 22 Akeyless Platform reviews. Expedites user logins using methods like a master password or password autofill. | 92% (Based on 22 reviews) | |
Browser Extension | Integrates the tool with your browser for easy use. This feature was mentioned in 19 Akeyless Platform reviews. | 76% (Based on 19 reviews) | |
Mobile App Usability | Based on 12 Akeyless Platform reviews. Integrates with your mobile device for use on mobile apps. | 63% (Based on 12 reviews) | |
Multi-Device Use | Enables user to use the tool across multiple devices. 16 reviewers of Akeyless Platform have provided feedback on this feature. | 82% (Based on 16 reviews) | |
Admin Management | Allows an employer or administrator to manage employee access. 20 reviewers of Akeyless Platform have provided feedback on this feature. | 87% (Based on 20 reviews) |
Security Measures
Password Generator | As reported in 16 Akeyless Platform reviews. Generates passwords for each of your logins. | 89% (Based on 16 reviews) | |
Two-Factor Authentication | See feature definition | Provides extra security by requiring an extra for of verification in addition to a password. 17 reviewers of Akeyless Platform have provided feedback on this feature. | 93% (Based on 17 reviews) |
Functionality
Durability | Logs and stores multiple copies and versions of master keys. This feature was mentioned in 15 Akeyless Platform reviews. | 89% (Based on 15 reviews) | |
Envelope Encryption | Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK). This feature was mentioned in 10 Akeyless Platform reviews. | 90% (Based on 10 reviews) | |
Automation | Allows administrative control over automated tasks related to key management, storage and distribution. This feature was mentioned in 13 Akeyless Platform reviews. | 88% (Based on 13 reviews) | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. | Not enough data | |
Single Sign-On | Provides a single access point for users to access multiple cloud products without multiple logins. 12 reviewers of Akeyless Platform have provided feedback on this feature. | 97% (Based on 12 reviews) | |
BYOD support | Enables users to bring-your-own-device to access company applications. | Not enough data | |
Password Vault | As reported in 10 Akeyless Platform reviews. Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users. | 92% (Based on 10 reviews) | |
Centralized management | Based on 11 Akeyless Platform reviews. Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected. | 94% (Based on 11 reviews) | |
Role-based security | Based on 13 Akeyless Platform reviews. Allows privileges based on roles, such as business unit or other factors. | 91% (Based on 13 reviews) | |
Live notifications | Configure which events will trigger a notification to prevent privileged access abuse in real-time. | Not enough data | |
Live session recording & playback | Offers live session recording and playback for compliance and auditing purposes. | Not enough data | |
Hide passwords | Offers the option to hide passwords when sharing with users, such as contract workers This feature was mentioned in 12 Akeyless Platform reviews. | 92% (Based on 12 reviews) | |
Temporary, time-limited privilege | Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. This feature was mentioned in 11 Akeyless Platform reviews. | 89% (Based on 11 reviews) | |
Certificate Discovery | Automatic discovery of certificates directly from Certificate Authorities, network scanning, and deep discovery methods. | Not enough data | |
Expiration Monitoring | Monitors and notifies administrators of certificate expiration dates. | Not enough data | |
Automated Certificate Operations | Automates certificate deployment, renewals, and revocations. | Not enough data | |
Policy And Role-Based Access Controls | Offers granular permissions for assigning certificate owners and other roles. | Not enough data | |
Workflow | Offers built-in workflows to assign ownership and management of certificates. | Not enough data | |
Protocol Support | Offers industry-standard protocols such as CMP, ACME, and SCEP. | Not enough data | |
Reporting And Search | Offers template and custom reports and search functionality. | Not enough data | |
Audit And Enforcement | Enforces certificate policies and provides audit trails of user and certificate activities to detect issues. | Not enough data | |
Key Storage | Allows keys to be stored on end devices, on the platform, or hardware security modules. | Not enough data | |
Audit trail | Creates audit trail of secrets lifecycle 16 reviewers of Akeyless Platform have provided feedback on this feature. | 78% (Based on 16 reviews) | |
Cental dashboard | Has a centralized dashboard for users to interact with This feature was mentioned in 16 Akeyless Platform reviews. | 91% (Based on 16 reviews) | |
Universal approach | Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform 15 reviewers of Akeyless Platform have provided feedback on this feature. | 88% (Based on 15 reviews) |
Administration
Auditing | As reported in 12 Akeyless Platform reviews. Documents access and alterations of the database for analytics and reporting. | 88% (Based on 12 reviews) | |
Compliance | As reported in 12 Akeyless Platform reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 92% (Based on 12 reviews) | |
Management Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks. 13 reviewers of Akeyless Platform have provided feedback on this feature. | 92% (Based on 13 reviews) | |
Policy, User, and Role Management | Based on 14 Akeyless Platform reviews. Creates access requirements and standards and establishes user, roles, and access rights. | 87% (Based on 14 reviews) | |
Approval Workflows | Allows administrators to approve or reject access changes to using defined workflows. | Not enough data | |
Automated Provisioning | Based on 12 Akeyless Platform reviews. Automates provisioning and deprovisioning to reduce the amount of administrative manual work. | 88% (Based on 12 reviews) | |
Bulk Changes | Reduces manual administrative work. 11 reviewers of Akeyless Platform have provided feedback on this feature. | 80% (Based on 11 reviews) | |
Centralized Management | As reported in 12 Akeyless Platform reviews. Manages identity information from on-premise and cloud applications. | 90% (Based on 12 reviews) | |
Self-Service Access Requests | As reported in 10 Akeyless Platform reviews. Automatically allows access if users meet policy requirements. | 90% (Based on 10 reviews) |
Availability
API/Integrations | Integrates with third-party software to provide other features and expand functionality. This feature was mentioned in 13 Akeyless Platform reviews. | 85% (Based on 13 reviews) | |
Service Integration | Based on 12 Akeyless Platform reviews. Integrates with major cloud service provider offerings for simplified management and distribution. | 90% (Based on 12 reviews) | |
Regional Support | Supports key distribution across multi-regions to increase availability. 11 reviewers of Akeyless Platform have provided feedback on this feature. | 92% (Based on 11 reviews) | |
Scalability | As reported in 14 Akeyless Platform reviews. Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality. | 93% (Based on 14 reviews) |
Monitoring
Audit Logging | Based on 11 Akeyless Platform reviews. Provides audit logs for compliance reasons. | 82% (Based on 11 reviews) | |
Activity Logging | Monitors, records, and logs both real-time and post-event activity. 12 reviewers of Akeyless Platform have provided feedback on this feature. | 81% (Based on 12 reviews) | |
Anomaly Detection | Detects abnormal user behavior to mitigate risks. | Not enough data |
Reporting
Audit log | Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. This feature was mentioned in 13 Akeyless Platform reviews. | 78% (Based on 13 reviews) | |
Reporting | As reported in 11 Akeyless Platform reviews. Includes reporting functionality. | 79% (Based on 11 reviews) |