
Ramat Gan, Israel
Akeyless Security protects and manages credentials, certificates, and keys used by machines, applications, and DevOps teams.
- Revenue
- $17.7M
- Customers
- -
- Year founded
- 2018
- Funding
- -
- Team size
- 93
- Growth
- 136.34%
As of May 2026, there are 15 SaaS companies in Secrets Management Tools. They have combined revenues of $56.1M and employ 478 people. They have raised $18M and serve 150K customers combined.
Secrets management tools are specialized software applications designed to store, control, and manage sensitive digital credentials such as passwords, API keys, certificates, and tokens. They provide a secure means of ensuring that this sensitive information is not exposed or mishandled, thereby reducing the risk of data breaches and unauthorized access. These tools typically include features for lifecycle management, access control, encryption, and auditing to track who accessed what and when. Primary use cases for secrets management tools include protecting credentials for applications, servers, and workloads in both development and production environments. Common workflows involve securely storing secrets in a central vault, managing access permissions for authorized users and systems, and rotating secrets regularly to maintain security integrity. Typical buyers of these solutions include IT security teams, DevOps engineers, and software developers, who require robust mechanisms for safeguarding sensitive data across modern cloud and on-premises infrastructures.
Sorting: Highest -> Lowest
Showing 10 of 15 companies ranked by annual revenue.

Ramat Gan, Israel
Akeyless Security protects and manages credentials, certificates, and keys used by machines, applications, and DevOps teams.

Paris, Ile-de-france, France
Developer of a cybersecurity platform designed to scan all GitHub public activity in real-time. The company's platform uses machine learning algorithms to analyze hacker activities on GitHub to prevent data leakage of API secret tokens, database credentials or vault keys, enabling clients to enforce security policies across public and private code, and other data sources as well.

Santa Clara, California, United States
Keep secrets in, keep threats out. Allow AI and unleash productivity.

Antwerp, Belgium
Say goodbye to flat text “secure notes” to store anything that’s not a password. Hypervault offers the solution for businesses to securely store, share and organize many types of sensitive data, not just passwords. Great for IT, Devs, Agencies, and Startups!

United States
Piiano builds data security infrastructure for developers. Piiano Vault is developed by former IDF cybersecurity experts. Bringing together decades of experience in hacking, engineering and software management capabilities. Our innovative Vault runtime protection technology stops data theft in production environments. Talk to us to find out how!

Tel-Aviv, Israel
Entro Security is a cybersecurity platform that offers end-to-end protection for secrets and programmatic access to cloud services and data. Our platform is designed to provide comprehensive oversight and uncompromised protection for organizations secrets, ensuring that CISOs and cyber security professionals can focus on what matters most: keeping their organizations safe.

San Francisco, California, United States
Smallstep empowers organizations to effortlessly deploy end-to-end encryption across their infrastructure. The comprehensive platform detects and mitigates anomalies, equipping developers with a toolkit that continuously monitors everything, everywhere. Smallstep removes the gap traditional secrets create, using certificates to enable trusted communications between technology and people. Learn more about operationalizing end-to-end encryption for all your devices, workloads, and people at smallstep.com.

Boston, Massachusetts, United States
Eliminate misconfigurations. Consider this: Config data is "mission-critical" but often treated casually because "it's just config." Did you know that 75% of outages trace back to a misconfiguration? Application errors can bring down a feature. Config errors can crash an entire system, putting revenue and reputation at risk. CloudTruth Config-as-a-Platform: - Centralized secrets and config data orchestration platform - Connects to existing build, deploy, and runtime toolchain - Integrates with AWS SM, AKV, Vault and DIY systems - Templates, inheritance, and overrides eliminate toil - Change history, SOC2 audit trail, and strong RBAC - Offered as SaaS or self-hosted Benefits: - Increase release velocity by 50% - Simple and easy secrets rotation - 100% secrets and configuration observability Schedule a demo with the Config Data Experts: https://meetings.hubspot.com/tatetruth/meet-cloudtruth

Dublin, Ireland
Developer of application programming interface (API) security platform. The company's enterprise-grade, fully fledged end-to-end API security platform offers confidentiality, integrity, availability, automatic generation of the security configuration for API orchestrations, management of API Keys, passwords and other sensitive data and protection of API Infrastructure, enabling clients to secure their API-based applications.
- Must securely store sensitive digital credentials such as passwords and API keys. - Must provide access control mechanisms to regulate who can access specific secrets. - Must include features for the lifecycle management of secrets, including automatic rotation and expiry. - Must offer auditing capabilities to log access and changes made to secrets. - Not just for storage; must also facilitate secure retrieval and usage of secrets in applications. - Should support integration with various development and deployment environments.
Each Tuesday, we reverse-engineer a real SaaS company's revenue, profit, CAC, funnels, and its top growth tactic.
Sign up to access all features
Sign up with GoogleSign up with LinkedInAlready have an account? Log in
GetLatka is trusted by 200k+ founders, researchers, and marketers.
No contracts, cancel at any time