List of Akeyless Security Customers
New York, 10013, NY,
United States
Since 2010, our global team of researchers has been studying Akeyless Security customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Akeyless Security for Identity and Access Management (IAM) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Akeyless Security for Identity and Access Management (IAM) include: Cimpress plc, a Ireland based Professional Services organisation with 15000 employees and revenues of $2.89 billion, Constant Contact, a United States based Professional Services organisation with 1250 employees and revenues of $645.0 million, Progress, a United States based Professional Services organisation with 10 employees and revenues of $1.0 million and many others.
Contact us if you need a completed and verified list of companies using Akeyless Security, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Akeyless Security customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight | Insight Source |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Cimpress plc | Professional Services | 15000 | $2.9B | Ireland | Akeyless Security | Akeyless Security | Identity and Access Management (IAM) | 2022 | n/a | In 2022, Cimpress plc deployed Akeyless Security as a Secrets Management platform to centralize secrets management across its global printing and mass-customization operations. The implementation targeted security and DevOps functions to consolidate credential handling and machine identity controls within core engineering and operations teams. The deployment focused on enterprise secrets management and machine identity and credential rotation capabilities, with configuration of automated secret lifecycle policies, role-based access controls, and API and CLI access for CI/CD workflows. Akeyless Security was configured to manage service tokens, API keys, and infrastructure credentials rather than HR or payroll data, reflecting inferred module usage consistent with the case study descriptions. Operational coverage aligned secret custody with development, operations, and security teams supporting Cimpress plc global printing sites and mass-customization business units, while maintaining centralized audit logging and policy enforcement. The published case details report a roughly 70% reduction in costs and a 270% increase in adoption versus their previous solution, figures captured as part of the deployment assessment. Governance was centralized under the security organization with policy-driven rotation, audit trails, and adoption monitoring to enforce credential lifecycle controls and operationalize secrets orchestration for DevOps workflows. The configuration emphasizes machine identity management and secrets lifecycle automation as the primary business function impact, keeping non-relevant business functions out of scope. | |
|
|
Constant Contact | Professional Services | 1250 | $645M | United States | Akeyless Security | Akeyless Security | Identity and Access Management (IAM) | 2022 | n/a | In 2022, Constant Contact adopted Akeyless Security as its centralized platform for secrets management within its security/DevOps practice, deploying the Akeyless Security solution across Kubernetes clusters and multi cloud infrastructure in the United States. The engagement positioned Akeyless Security to serve machine identity and non human credential protection use cases alongside secrets vaulting, with the company explicitly focusing on secrets management and non human identity protection rather than HR or finance applications. The implementation centered on secrets lifecycle management capabilities and non human identity controls, including automated credential rotation, centralized secret storage, access control policies, and audit logging. Constant Contact configured Akeyless Security to handle machine and CI CD credential provisioning and rotation, aligning runtime secrets workflows with existing DevOps pipelines and cluster access patterns. Operational integration covered Kubernetes platform integration and multi cloud provider endpoints, together with CI CD toolchain connectors to secure non human identities and machine credentials throughout build and deployment workflows. The deployment was scoped to the security and DevOps organization in the United States, creating a single control plane for secrets visibility and operational management across infrastructure. Governance and process changes included policy driven rotation schedules, centralized audit trails for secret access, and role based access controls to reduce manual credential handling. Reported outcomes from the initiative included improved visibility into secret usage, automated credential rotation, and reduced infrastructure burden as Akeyless Security became the primary secrets management and non human identity protection layer for Constant Contact. | |
|
|
Progress | Professional Services | 10 | $1M | United States | Akeyless Security | Akeyless Security | Identity and Access Management (IAM) | 2022 | n/a | In 2022, Progress implemented Akeyless Security Apps Category: to fight secret sprawl across AWS, Azure, and GCP for its application development and deployment teams. Progress implemented Akeyless Security to centralize secrets management and machine identity controls across its multi cloud build and release pipelines. The implementation focused on secrets management and zero trust machine identities, using centralized vaulting, automated credential issuance, and pipeline injection patterns common to secrets management tooling. Akeyless Security was configured to provision short lived credentials and rotate secrets as part of CI CD workflows, aligning with security and DevOps functional requirements for development and deployment teams. Integrations were executed across AWS, Azure, and GCP to unify secret storage and access policies for cloud resources, with operational coverage scoped to application development and deployment functions. Progress reported around 60 to 70 percent less management overhead and faster DevOps integration after the rollout, and Akeyless Security serves as the central secrets control plane for Progress application development and deployment teams. |
Buyer Intent: Companies Evaluating Akeyless Security
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||