Introducing G2.ai, the future of software buying.Try now

Compare Akeyless Identity Security Platform and Doppler secrets management platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Star Rating
(82)4.6 out of 5
Market Segments
Enterprise (49.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Akeyless Identity Security Platform
Doppler secrets management platform
Doppler secrets management platform
Star Rating
(61)4.8 out of 5
Market Segments
Small-Business (80.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free 1 Seat Per Month
Free Trial is available
Browse all 3 pricing plans

Akeyless Identity Security Platform vs Doppler secrets management platform

When assessing the two solutions, reviewers found Doppler secrets management platform easier to use, set up, and administer. However, reviewers felt that both vendors make it equally easy to do business overall.

  • Reviewers felt that Doppler secrets management platform meets the needs of their business better than Akeyless Identity Security Platform.
  • When comparing quality of ongoing product support, reviewers felt that Doppler secrets management platform is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Doppler secrets management platform over Akeyless Identity Security Platform.
Pricing
Entry-Level Pricing
Akeyless Identity Security Platform
No pricing available
Doppler secrets management platform
Developer Plan
Free
1 Seat Per Month
Browse all 3 pricing plans
Free Trial
Akeyless Identity Security Platform
Free Trial is available
Doppler secrets management platform
Free Trial is available
Ratings
Meets Requirements
8.9
61
9.6
48
Ease of Use
9.0
60
9.6
50
Ease of Setup
8.2
49
9.4
40
Ease of Admin
8.7
42
9.7
28
Quality of Support
9.2
55
9.5
37
Has the product been a good partner in doing business?
9.7
41
9.7
25
Product Direction (% positive)
9.6
55
10.0
44
Features by Category
Encryption Key ManagementHide 10 FeaturesShow 10 Features
9.1
24
9.1
15
Functionality
9.2
22
9.5
14
9.2
17
9.5
11
9.2
20
8.7
13
Availability
8.8
20
9.4
11
9.2
19
9.1
13
9.4
18
7.6
9
9.4
21
9.6
12
Administration
8.8
19
9.1
11
9.4
18
Feature Not Available
9.0
20
9.3
14
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
8.9
18
Not enough data
Administration
8.9
18
Not enough data
8.5
10
Not enough data
9.0
16
Not enough data
8.4
15
Feature Not Available
9.2
16
Feature Not Available
9.2
14
Feature Not Available
Functionality
9.9
13
Not enough data
9.8
16
Not enough data
9.8
11
Feature Not Available
9.2
14
Feature Not Available
9.4
15
Not enough data
9.3
17
Not enough data
8.6
12
Not enough data
9.3
9
Feature Not Available
9.4
16
Not enough data
9.2
15
Not enough data
Monitoring
8.6
15
Not enough data
8.4
16
Not enough data
8.8
10
Feature Not Available
Reporting
8.2
17
Not enough data
8.3
15
Not enough data
Certificate Lifecycle Management (CLM)Hide 9 FeaturesShow 9 Features
9.9
9
Not enough data
Functionality
10.0
5
Not enough data
10.0
5
Not enough data
10.0
5
Not enough data
9.7
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
9.3
5
Not enough data
10.0
6
Not enough data
Secrets Management ToolsHide 3 FeaturesShow 3 Features
8.2
30
9.4
34
Functionality
7.5
26
9.1
32
8.5
26
9.5
33
8.5
25
9.7
32
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
29
Not enough data
Usability & Access
9.3
28
Not enough data
8.1
25
Not enough data
7.3
18
Not enough data
8.6
22
Not enough data
8.8
26
Not enough data
Security Measures
9.0
22
Not enough data
9.3
23
Not enough data
Feature Not Available
Not enough data
Storage
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Doppler secrets management platform
Doppler secrets management platform
Akeyless Identity Security Platform and Doppler secrets management platform are categorized as Secrets Management Tools, Encryption Key Management, and Privileged Access Management (PAM)
Unique Categories
Doppler secrets management platform
Doppler secrets management platform has no unique categories
Reviews
Reviewers' Company Size
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Small-Business(50 or fewer emp.)
20.8%
Mid-Market(51-1000 emp.)
29.9%
Enterprise(> 1000 emp.)
49.4%
Doppler secrets management platform
Doppler secrets management platform
Small-Business(50 or fewer emp.)
80.3%
Mid-Market(51-1000 emp.)
18.0%
Enterprise(> 1000 emp.)
1.6%
Reviewers' Industry
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Information Technology and Services
15.4%
Computer Software
12.8%
Marketing and Advertising
10.3%
Insurance
9.0%
Financial Services
9.0%
Other
43.6%
Doppler secrets management platform
Doppler secrets management platform
Computer Software
42.6%
Information Technology and Services
8.2%
Higher Education
4.9%
Telecommunications
3.3%
Real Estate
3.3%
Other
37.7%
Alternatives
Akeyless Identity Security Platform
Akeyless Identity Security Platform Alternatives
HashiCorp Vault
HashiCorp Vault
Add HashiCorp Vault
1Password
1Password
Add 1Password
Egnyte
Egnyte
Add Egnyte
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
Doppler secrets management platform
Doppler secrets management platform Alternatives
HashiCorp Vault
HashiCorp Vault
Add HashiCorp Vault
1Password
1Password
Add 1Password
Egnyte
Egnyte
Add Egnyte
Virtru Email Encryption
Virtru Email Encryption
Add Virtru Email Encryption
Discussions
Akeyless Identity Security Platform
Akeyless Identity Security Platform Discussions
Monty the Mongoose crying
Akeyless Identity Security Platform has no discussions with answers
Doppler secrets management platform
Doppler secrets management platform Discussions
Monty the Mongoose crying
Doppler secrets management platform has no discussions with answers