
Ramat Gan, Israel
Akeyless Security protects and manages credentials, certificates, and keys used by machines, applications, and DevOps teams.
- Revenue
- $17.7M
- Customers
- -
- Year founded
- 2018
- Funding
- -
- Team size
- 93
- Growth
- 136.34%
As of May 2026, there are 15 SaaS companies in Secrets Management Tools. They have combined revenues of $56.1M and employ 478 people. They have raised $18M and serve 150K customers combined.
Secrets management tools are specialized software applications designed to store, control, and manage sensitive digital credentials such as passwords, API keys, certificates, and tokens. They provide a secure means of ensuring that this sensitive information is not exposed or mishandled, thereby reducing the risk of data breaches and unauthorized access. These tools typically include features for lifecycle management, access control, encryption, and auditing to track who accessed what and when. Primary use cases for secrets management tools include protecting credentials for applications, servers, and workloads in both development and production environments. Common workflows involve securely storing secrets in a central vault, managing access permissions for authorized users and systems, and rotating secrets regularly to maintain security integrity. Typical buyers of these solutions include IT security teams, DevOps engineers, and software developers, who require robust mechanisms for safeguarding sensitive data across modern cloud and on-premises infrastructures.
Sorting: Highest -> Lowest
Showing 10 of 2 companies ranked by annual revenue.

Ramat Gan, Israel
Akeyless Security protects and manages credentials, certificates, and keys used by machines, applications, and DevOps teams.

Paris, Ile-de-france, France
Developer of a cybersecurity platform designed to scan all GitHub public activity in real-time. The company's platform uses machine learning algorithms to analyze hacker activities on GitHub to prevent data leakage of API secret tokens, database credentials or vault keys, enabling clients to enforce security policies across public and private code, and other data sources as well.
- Must securely store sensitive digital credentials such as passwords and API keys. - Must provide access control mechanisms to regulate who can access specific secrets. - Must include features for the lifecycle management of secrets, including automatic rotation and expiry. - Must offer auditing capabilities to log access and changes made to secrets. - Not just for storage; must also facilitate secure retrieval and usage of secrets in applications. - Should support integration with various development and deployment environments.
Each Tuesday, we reverse-engineer a real SaaS company's revenue, profit, CAC, funnels, and its top growth tactic.
Sign up to access all features
Sign up with GoogleSign up with LinkedInAlready have an account? Log in
GetLatka is trusted by 200k+ founders, researchers, and marketers.
No contracts, cancel at any time