Skip to content

Akeyless unveiled the world’s first Unified Secrets and Machine Identity Platform to address the #1 cause of breaches. Discover Why & How.

SUBCONTRACTORS LIST

Last Updated December 31st, 2024

Akeyless uses the third-party vendors, subcontractors, sub-processors or other members, affiliates, of Akeyless, all as listed below (each “Subcontractor”) to conduct and preform its business operations and services.

Certain Subcontractors carry out data-processing activities that involve access to customer personal data (“Customer Data”), these Subcontractors are referred as “Sub-processors” under applicable data protection laws. The Sub-processors process personal data on behalf of Akeyless’ customers, in accordance with customers’ instructions as communicated by Akeyless, and n strict accordance with the terms of a written contract between Akeyless and the said sub-processor.

Akeyless uses commercially reasonable selection process by which it evaluates the security, privacy and confidentiality practices of proposed Subcontractors that will or may have access to or otherwise process Customer Data.

Akeyless requires its Subcontractors to maintain a written information security program, not less rigorous than Akeyless’ Security Program, available at https://www.akeyless.io/data-protection-measures/. Further, in the event of a security breach, Akeyless requires the Subcontractors to immediately inform Akeyless, and cooperate with Akeyless (and to the extent applicable, with Akeyless’ customers) to mitigate the breach. These Subcontractor contracts also include audit rights toward Akeyless, and to the extent applicable towards Akeyless’ customers.

Akyeless considers the locations in which the Subcontractors are established and where would the data be hosted, processed, accesses and transferred when onboarding a new Subcontractor. Akeyless required any Subcontractor to notify Akeyless in case the location has changed.

This list is updated from time to time, including the names and locations of the Subcontractors, Akeyless’ customers shall register below to the Subcontractor change notification [HS1] to receive updates when Akeyless makes changes to the list below.

Entity NameLEI Number or Registration NumberHQ Country and AddressCountry where data is storedNature of provided serviceSub-processor List if Available Online
Google LLC, (GCP and Google Work Space)7ZW8QJWVPR4P1J1KQY451600 Amphitheatre Parkway Mountain View CA 94043, USAUnited States and EuropeHostingList
Atlassian Pty Ltd. 5493005ANNO41NYIM267Level 6, 341 George Street, Sydney, NSW 2000, AustraliaUnited States and EuropeProject managementList
Logshero Ltd.  (Logz.io)515132884 Hamsger 35 ,Tel Aviv – Jaffa. IsraelIsraelLog Management and Observability 
JetBrains s.r.o265 02 275a Hřebenech II 1718/8, Prague, 14000, Czech RepublicEuropeSoftware development and licensing 
Slack Technologies Limited549300VIZRB02KN4IJ45Slack Technologies Limited, Salesforce Tower, 60 R801, North Dock, Dublin, IrelandUSAInternal communication tool for SupportList
JFROG LTD5141304918187, 3 Hamachshev Street, Netanya, 4250465 IsraelIsrael and USASecurity Management ServicesList
HUBSPOT & CO LTDINR2EJN1ERAN0W5ZP974United States of America, Delaware, RA000602USAProvision of dataList
Microsoft Corporation (Azure)INR2EJN1ERAN0W5ZP974One Microsoft Way, Redmond, WA 98052, USAUSA and EuropeHostingList
Pylon Labs, Inc.5360508188 KING STREETUNIT 502SAN FRANCISCO CA 94107USACustomer Support ticketingList
Amazon Web Services LLC549300B1UIM93TXPOD041200 12th Avenue South, Suite 1200, Seattle, WA 98144, USAUSA and EuropeHostingList
Twilio Inc.5493004W8TRGD63APX93375 Beale Street, Suite 300, San Francisco, CA, 94105, U.S.A.USACloud communication platformList
SupportYourApp Inc.55891721007 North Orange Street, 4th Floor, Suite 122, Wilmington, DE 19801, USAUSAHelp Desk and Customer support servicesList
Priority Software Ltd.5111241092 Amal Street, Rosh Haayin 4809202, IsraelIsraelEnterprise Resource Planning