DevOps
Integrate Secrets Management into your DevOps WorkflowAvailable solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. That should, and can, be changed.
DevOps
Integrate Secrets Management into your DevOps WorkflowAvailable solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. That should, and can, be changed.
Product Updates
Introducing Tags to Akeyless VaultIntro to tags In information systems, a tag is a keyword or term assigned to a piece of information, like a digital record. This kind of metadata helps describe an item and allows it to be found again by browsing or searching. People use tags to aid classification, mark ownership, note boundaries, and indicate identity. […]
Security
Using Akeyless to Enable Zero-Trust Secure Remote AccessImplementing a Zero Trust security model requires that your organization isn't trusting anyone or anything automatically, from inside or outside of your organization. In this blog we'll delve into some of Zero Trust principles of Just-in-Time Access, Least Privileged Approach and Zero-Standing Permissions, discussing why Akeyless is in the best position to provide a comprehensive Zero-Trust solution.
Security
Better Protect Your Ansible Secrets and Privileged AccessConfiguration management tools, such as Ansible, have become an attack target for malicious attackers. Find out how to add two layers of protection to your Ansible secrets.
Security
Better Protect Your Kubernetes Secrets and Privileged AccessContainer orchestration tools, such as Kubernetes, have become an attack target for malicious attackers. Find out how to add two layers of protection to your Kubernetes secrets.
News
Akeyless Vault Secrets Management on the Absolute AppSec PodcastWe were thrilled to get the chance to introduce AKEYLESS to the Absolute AppSec podcast! Our CEO, Oded Hareven, told the story of AKEYLESS Vault, explained...
Security
Just-in-time Access Done Right for DevOps and Security TeamsJust-in-time (JIT) originates from the manufacturing industry. Its goal is to eliminate waste by receiving what you need when you need it. JIT has very practical uses in security risk...
DevOps
Secrets Management “Done Right” Improves Your DevOps KPIsAn IT Ecosystem cloud technologies infrastructure is constantly changing and must scale to fit the needs of your organization. Cloud technologies require secrets...
Security
Eliminating SSH Keys is Possible by Using SSH Certificates InsteadIf you’re looking to free your time and stop using SSH Keys by leveraging SSH Certificates automation, there is a way to do that. SSH Keys provide a secure protocol...
Product Updates
AKEYLESS Wins Next Gen Secrets Management AwardAKEYLESS is awarded in two categories in the 8th Annual InfoSec Awards at RSAC 2020: Market Leader in the Keys Management & Protection category, and Next Gen Secrets Management Solution.