
Ramat Gan, Israel
Akeyless Security protects and manages credentials, certificates, and keys used by machines, applications, and DevOps teams.
- Revenue
- $17.7M
- Customers
- -
- Year founded
- 2018
- Funding
- -
- Team size
- 93
- Growth
- 136.34%
As of May 2026, there are 5 SaaS companies in Encryption Key Management Software. They have combined revenues of $24.8M and employ 156 people. They have raised $17.7M and serve - customers combined.
Encryption Key Management Software enables organizations to efficiently create, distribute, store, and manage cryptographic keys essential for data security. This category of software plays a critical role in protecting sensitive information by ensuring that encryption keys are properly secured against unauthorized access or loss. Typical features of this software include centralized key storage, automated key rotation, access control mechanisms, and detailed auditing capabilities. These workflows help organizations increase their compliance with data protection regulations and minimize the risk of data breaches while streamlining key management processes. The primary users of Encryption Key Management Software often include IT security professionals, compliance officers, and system administrators who need robust solutions to manage the lifecycle of encryption keys across various platforms and environments. By implementing such software, organizations can enhance their overall security posture and maintain control over their cryptographic assets.
Sorting: Highest -> Lowest
Showing 10 of 5 companies ranked by annual revenue.

Ramat Gan, Israel
Akeyless Security protects and manages credentials, certificates, and keys used by machines, applications, and DevOps teams.

Coral Springs, Florida, United States
Afi.ai develops a long-term resilient data protection service built from the ground up for SaaS applications and cloud infrastructure. We provide secure, reliable and affordable backup with a broad range of unique features, including BYOK encryption key management integrations with all major providers, multi-geo backup storage compliant with GDPR and other regional data protection laws, granular multi-level roles and access control, immutable event log, proactive notification system and integrations with all major SEIM platforms. Afi Social Media Policy LinkedIn doesn’t provide tools for removing erroneous associated members’ accounts from a company page, and we view this as a major source of potential phishing and social engineering attacks. We limit LinkedIn usage by our team members and encourage them to avoid exposing their personal data, contacts and work details in order to mitigate the risk of targeted cyber attacks. Afi disclaims any relation with non-verified LinkedIn members associated with the company page. We don’t share individual emails, names or other categories of personal data via LinkedIn messages. For all customer inquiries, please reach out to your account manager or our sales team at [email protected], via phone or our web ticketing system. For media inquiries, please reach out at [email protected], for legal matters please reach at [email protected], for all other matters please contact us at [email protected].

Atlanta, Georgia, United States
With Machina™ - the first system of record for data access policy management, encryption key management, and real-time policy enforcement - Ionic enables scalable, sustainable, and consistent data protection, accelerating your innovation initiatives wherever you are in your journey to the cloud.

Aarhus, Denmark
Provider of data-protection services designed to offer cloud-encryption software to encrypt cloud-data. The company's data-protection services use zero-trust cloud-native Key Management System that delivers cryptographic quality encryption and does not rely on hardware appliances or on any single service provider, enabling businesses to retain full control over the encryption keys.

San Jose, California, United States
Verifyle is ultra-secure messaging and documents sharing, all from a single screen. VeriFyle's patented encryption key management technology, Cellucrypt, uses six layers of encryption to protect each individual document, unlike most cloud sharing services which use only a single key. We offer our users the ability to disable password reset, effectively closing the backdoor to your account and making it so that no one can see your data but you. Verifyle also offers unlimited digital signatures in our Pro version for only $9 per month. Simple, secure, signatures. Everything you need in a cloud storage and sharing tool, nothing you don't.
- The software must provide secure storage and management of encryption keys. - It should include access control features to limit who can interact with keys. - Automated key rotation capabilities must be present to ensure keys are updated regularly. - The product should offer detailed logging and auditing to track key usage and access. - It must support integration with various applications and systems for seamless key management. - Not just basic encryption; it must also enable users to create and manage key lifecycles comprehensively.
Each Tuesday, we reverse-engineer a real SaaS company's revenue, profit, CAC, funnels, and its top growth tactic.
Sign up to access all features
Sign up with GoogleSign up with LinkedInAlready have an account? Log in
GetLatka is trusted by 200k+ founders, researchers, and marketers.
No contracts, cancel at any time