67 Akeyless Platform Reviews
Overall Review Sentiment for Akeyless Platform
Log in to view review sentiment.
Some of the best things about Akeyless include:
1. Centralized management: Akeyless provides a centralized management interface for all your secrets, passwords and access tokens. This makes it easy to manage and audit all of the above.
2. Fine-grained access controls: Akeyless allows you to granularly control access to all of the information stored in the platform. This ensures that only authorized users can access their secrets.
3. Secure and centralized storage: Akeyless stores your secrets in a secure manner, keeping all credentials in a single solution. They’re encrypted and access is controlled.
4. Scalability and multicloud: It is scalable and can handle large volumes of secrets even between different cloud providers. This makes it suitable for any organization that has implemented cloud services. . Review collected by and hosted on G2.com.
I don’t have many dislikes about Akeyless but I think it’s worth mentioning that you need to spend some time working with it to become familiar with all of its features and functions. Review collected by and hosted on G2.com.
Great service, first of all. If you have an issue or a new feature request, the guys are always there. Apart from that, one of the best secret management tools with many features and integrations Review collected by and hosted on G2.com.
Have a learning curve to the system, but I guess every system has one. Review collected by and hosted on G2.com.

How many applications are supported out of the box by Akeyless. Cloud-based solution. Secrets management. Quick responses from Akeyless support. Review collected by and hosted on G2.com.
Documentation could be a little better, some things are very well explained and some are just to find out by trying. Missing some features which I'm sure will be added in future, for example - temporary access to secrets, approving the access to the secrets. Installation of the browser extension is something I think is not the best way. Review collected by and hosted on G2.com.

Akeyless Vault Platform is beneficial to us as our centralized secrets management utility that stores, rotates, and automatically creates passwords and keys. It helps us define our AWS access credentials dynamically based on our IAM policies. The convenience for retrieving the Access Key ID and Secret Access Key for any new IAM user is also straightforward with Akeyless Vault Platform. Review collected by and hosted on G2.com.
I don't see any negatives while working on Akeyless Vault Platform. It provisions Remote Access connectivity, which is highly secured and compatible with our public, private and on-premise environments. Review collected by and hosted on G2.com.

Akeyless has easy to deploy on-prem component and covers most of the industry standard use-cases. Major feature is their Hybrid cloud deployment model.Product documentation is customer centric specially API testing portal. Review collected by and hosted on G2.com.
More sophistacated solution for secret zero problem. Review collected by and hosted on G2.com.
This changes SSH from key/password management to time-based certificate management based on Active Directory accounts. Very useful for central management. Review collected by and hosted on G2.com.
Setup is a little rough when we installed it. There are some limitations on ssh automation with this solution. Review collected by and hosted on G2.com.
The User interface is quite simple and its scope of storing different sort of secrets along with the Distributed Key Fragments for encryption keys storage.
Customer support is far better then multiple vendors that we worked with during the evaluation phase Review collected by and hosted on G2.com.
The complexity of one time setup for the gateways and Access roles, bit difficult to understand for a newbie but once get use to it, all looks easy Review collected by and hosted on G2.com.
akeyless has a great product and great support we use static and dynamic secrets to enhance the posture around those important security objects. they are still in startup mode so very open to feedback and agile. Review collected by and hosted on G2.com.
the system is pretty complex to administer, there is a big learning curve and if you want to use the fragmented secrets you need to maintain your own infra so it is not a complete SAAS. Review collected by and hosted on G2.com.
Encrypted Key-value store has helped in protecting secret strings. It is the best tool user could have. It helps in time-saving and making sure that secret keywords are not lying anywhere in plain text. Review collected by and hosted on G2.com.
SSh Keys are available for a short period of time. It makes the process a little time-consuming. Sharing SSH keys with other team members is also a challenge as the shared key gets expired quickly. Review collected by and hosted on G2.com.
Seamless connection to Stack. It really helps in reducing the communication time between multiple teams. Review collected by and hosted on G2.com.
SIEM integration documentation could be improved which will help in making the integration hassle free. Review collected by and hosted on G2.com.