Some of my favorite features of Vault include:
1. The ability to store secrets in a variety of formats. This makes it easy to store and access secrets regardless of the programming language or platform you are using. I have the most experience using Akeyless with Kubernetes environments.
2. The ability to access secrets through a variety of mechanisms, including a web-based interface, command line interface, and even a REST API. This makes it easy to access your secrets from anywhere in your organization.
3. The ability to audit all activity in Akeyless, including who accessed which secrets and when. This helps you to keep track of who is accessing your secrets and helps you to ensure that your secrets are safe and secure. If investigations are needed - audit logs make it easy.
4. The ability to set up role-based access controls, which allow you to control which users have access to which secrets. This helps you to ensure that only the right people have access to your secrets.
Overall, I believe that Akeyless is an excellent solution for managing secrets and I would highly recommend it to anyone looking for a secure and reliable way to store their secrets. Review collected by and hosted on G2.com.
The expiration time of SSH keys in Akeyless Vault is less than ideal because it can cause issues when sharing keys with teammates. I think an option to extend the expiration timing would be a fantastic addition. Review collected by and hosted on G2.com.
66 out of 67 Total Reviews for Akeyless Platform
Overall Review Sentiment for Akeyless Platform
Log in to view review sentiment.

Clear, user-frinedly UI. Dynamic, fastly growing and frequnlty upgrading functionality.
A detailed clear product documetion. Easy infrastracture for mainatiance and patching. A devouted, customer-oriented needs proffessional services team! Review collected by and hosted on G2.com.
A number of connectors\integration with infra systems for password management. Review collected by and hosted on G2.com.

Complete SAAS solution and customer fragmentation are the best things in Akeyless Review collected by and hosted on G2.com.
Hard to implement the features using the Akeyless documentation with wide range of authentication methods Review collected by and hosted on G2.com.

its easy to use. we use it a lot so its means a lot to us.
we like it. Review collected by and hosted on G2.com.
i cant think about something specific to say a bad thing on it. Review collected by and hosted on G2.com.

Akeyless is, by far, the easiest-to-use Secrets Management system out there. We've used all the major vendors available, and Akeyless is the only one we've used that can actually increase productivity by simplifying access management. It also has some unique solutions to the secret-zero problem, which have substantially improved the security posture for key teams in our organization. Review collected by and hosted on G2.com.
The documentation could use a bit more attention, although they make up for it with excellent support. Review collected by and hosted on G2.com.

Once understood, it is an easily implementable and easy to administer PAM tool (Secure Remote Access). From an operator’s perspective, it is intuitive and straightforward from the start. Akeyless places great emphasis on constructively addressing the wishes and suggestions of their customers and implementing them promptly when possible. This makes them a very reliable partner in the industry. We appreciate the proactive communication and the willingness to continuously improve their products and adapt them to customer needs. Overall, Akeyless offers a solid and trustworthy solution for privileged access, backed by a strong customer focus and a commitment to quality and reliability. Review collected by and hosted on G2.com.
While Akeyless has been commended for their excellent customer service and intuitive PAM tool, there is room for improvement in their technical documentation. Enhancing the clarity, comprehensiveness, and accessibility of their technical materials could further elevate the overall user experience and satisfaction. Akeyless’s commitment to addressing customer feedback suggests that they will take such suggestions seriously and strive to enhance their documentation accordingly. Review collected by and hosted on G2.com.
mostly user interface, apart from security. Ability to have nested directories, copy & paste secrets. Review collected by and hosted on G2.com.
takes time to load if i navigate to previous directory Review collected by and hosted on G2.com.