Best Software for 2025 is now live!
Save to My Lists
Paid
Claimed
Optimized for quick response

Akeyless Platform Features

What are the features of Akeyless Platform?

Usability & Access

  • Quick Login
  • Browser Extension
  • Multi-Device Use
  • Admin Management

Security Measures

  • Password Generator
  • Two-Factor Authentication

Functionality

  • Durability
  • Automation
  • Role-based security
  • Audit trail
  • Cental dashboard
  • Universal approach

Administration

  • Policy, User, and Role Management

Availability

  • Scalability

Reporting

  • Audit log

Filter for Features

Usability & Access

Quick Login

Based on 22 Akeyless Platform reviews. Expedites user logins using methods like a master password or password autofill.
92%
(Based on 22 reviews)

Browser Extension

Integrates the tool with your browser for easy use. This feature was mentioned in 19 Akeyless Platform reviews.
76%
(Based on 19 reviews)

Mobile App Usability

Based on 12 Akeyless Platform reviews. Integrates with your mobile device for use on mobile apps.
63%
(Based on 12 reviews)

Multi-Device Use

Enables user to use the tool across multiple devices. 16 reviewers of Akeyless Platform have provided feedback on this feature.
82%
(Based on 16 reviews)

Admin Management

Allows an employer or administrator to manage employee access. 20 reviewers of Akeyless Platform have provided feedback on this feature.
87%
(Based on 20 reviews)

Security Measures

Password Generator

As reported in 16 Akeyless Platform reviews. Generates passwords for each of your logins.
89%
(Based on 16 reviews)

Two-Factor AuthenticationView full feature definition

See feature definition
Provides extra security by requiring an extra for of verification in addition to a password. 17 reviewers of Akeyless Platform have provided feedback on this feature.
93%
(Based on 17 reviews)

Functionality

Durability

Logs and stores multiple copies and versions of master keys. This feature was mentioned in 15 Akeyless Platform reviews.
89%
(Based on 15 reviews)

Envelope Encryption

Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK). This feature was mentioned in 10 Akeyless Platform reviews.
90%
(Based on 10 reviews)

Automation

Allows administrative control over automated tasks related to key management, storage and distribution. This feature was mentioned in 13 Akeyless Platform reviews.
88%
(Based on 13 reviews)

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.

Not enough data

Single Sign-On

Provides a single access point for users to access multiple cloud products without multiple logins. 12 reviewers of Akeyless Platform have provided feedback on this feature.
97%
(Based on 12 reviews)

BYOD support

Enables users to bring-your-own-device to access company applications.

Not enough data

Password Vault

As reported in 10 Akeyless Platform reviews. Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.
92%
(Based on 10 reviews)

Centralized management

Based on 11 Akeyless Platform reviews. Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.
94%
(Based on 11 reviews)

Role-based security

Based on 13 Akeyless Platform reviews. Allows privileges based on roles, such as business unit or other factors.
91%
(Based on 13 reviews)

Live notifications

Configure which events will trigger a notification to prevent privileged access abuse in real-time.

Not enough data

Live session recording & playback

Offers live session recording and playback for compliance and auditing purposes.

Not enough data

Hide passwords

Offers the option to hide passwords when sharing with users, such as contract workers This feature was mentioned in 12 Akeyless Platform reviews.
92%
(Based on 12 reviews)

Temporary, time-limited privilege

Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. This feature was mentioned in 11 Akeyless Platform reviews.
89%
(Based on 11 reviews)

Certificate Discovery

Automatic discovery of certificates directly from Certificate Authorities, network scanning, and deep discovery methods.

Not enough data

Expiration Monitoring

Monitors and notifies administrators of certificate expiration dates.

Not enough data

Automated Certificate Operations

Automates certificate deployment, renewals, and revocations.

Not enough data

Policy And Role-Based Access Controls

Offers granular permissions for assigning certificate owners and other roles.

Not enough data

Workflow

Offers built-in workflows to assign ownership and management of certificates.

Not enough data

Protocol Support

Offers industry-standard protocols such as CMP, ACME, and SCEP.

Not enough data

Reporting And Search

Offers template and custom reports and search functionality.

Not enough data

Audit And Enforcement

Enforces certificate policies and provides audit trails of user and certificate activities to detect issues.

Not enough data

Key Storage

Allows keys to be stored on end devices, on the platform, or hardware security modules.

Not enough data

Audit trail

Creates audit trail of secrets lifecycle 16 reviewers of Akeyless Platform have provided feedback on this feature.
78%
(Based on 16 reviews)

Cental dashboard

Has a centralized dashboard for users to interact with This feature was mentioned in 16 Akeyless Platform reviews.
91%
(Based on 16 reviews)

Universal approach

Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform 15 reviewers of Akeyless Platform have provided feedback on this feature.
88%
(Based on 15 reviews)

Administration

Auditing

As reported in 12 Akeyless Platform reviews. Documents access and alterations of the database for analytics and reporting.
88%
(Based on 12 reviews)

Compliance

As reported in 12 Akeyless Platform reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
92%
(Based on 12 reviews)

Management Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks. 13 reviewers of Akeyless Platform have provided feedback on this feature.
92%
(Based on 13 reviews)

Policy, User, and Role Management

Based on 14 Akeyless Platform reviews. Creates access requirements and standards and establishes user, roles, and access rights.
87%
(Based on 14 reviews)

Approval Workflows

Allows administrators to approve or reject access changes to using defined workflows.

Not enough data

Automated Provisioning

Based on 12 Akeyless Platform reviews. Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
88%
(Based on 12 reviews)

Bulk Changes

Reduces manual administrative work. 11 reviewers of Akeyless Platform have provided feedback on this feature.
80%
(Based on 11 reviews)

Centralized Management

As reported in 12 Akeyless Platform reviews. Manages identity information from on-premise and cloud applications.
90%
(Based on 12 reviews)

Self-Service Access Requests

As reported in 10 Akeyless Platform reviews. Automatically allows access if users meet policy requirements.
90%
(Based on 10 reviews)

Availability

API/Integrations

Integrates with third-party software to provide other features and expand functionality. This feature was mentioned in 13 Akeyless Platform reviews.
85%
(Based on 13 reviews)

Service Integration

Based on 12 Akeyless Platform reviews. Integrates with major cloud service provider offerings for simplified management and distribution.
90%
(Based on 12 reviews)

Regional Support

Supports key distribution across multi-regions to increase availability. 11 reviewers of Akeyless Platform have provided feedback on this feature.
92%
(Based on 11 reviews)

Scalability

As reported in 14 Akeyless Platform reviews. Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality.
93%
(Based on 14 reviews)

Monitoring

Audit Logging

Based on 11 Akeyless Platform reviews. Provides audit logs for compliance reasons.
82%
(Based on 11 reviews)

Activity Logging

Monitors, records, and logs both real-time and post-event activity. 12 reviewers of Akeyless Platform have provided feedback on this feature.
81%
(Based on 12 reviews)

Anomaly Detection

Detects abnormal user behavior to mitigate risks.

Not enough data

Reporting

Audit log

Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. This feature was mentioned in 13 Akeyless Platform reviews.
78%
(Based on 13 reviews)

Reporting

As reported in 11 Akeyless Platform reviews. Includes reporting functionality.
79%
(Based on 11 reviews)