Introducing G2.ai, the future of software buying.Try now

Compare Akeyless Identity Security Platform and IXOPAY

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Star Rating
(82)4.6 out of 5
Market Segments
Enterprise (49.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Akeyless Identity Security Platform
IXOPAY
IXOPAY
Star Rating
(17)4.6 out of 5
Market Segments
Small-Business (47.1% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about IXOPAY
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that TokenEx excels in Quality of Support with a score of 9.8, while Akeyless Platform, although strong, has a slightly lower score of 9.3. Reviewers mention that TokenEx's support team is responsive and knowledgeable, making it easier for businesses to resolve issues quickly.
  • Reviewers mention that TokenEx offers superior Ease of Setup with a score of 9.3 compared to Akeyless Platform's 8.1. Users on G2 appreciate how straightforward the onboarding process is with TokenEx, allowing for a smoother transition.
  • Users say that Akeyless Platform shines in Centralized Management with a score of 9.0, which is on par with TokenEx. However, Akeyless is noted for its intuitive dashboard that simplifies the management of multiple secrets and credentials, making it a favorite among enterprise users.
  • G2 users report that TokenEx has a strong focus on Multi-Factor Authentication, scoring 9.8, which is slightly higher than Akeyless Platform's 9.5. Reviewers mention that this feature enhances security significantly, making TokenEx a preferred choice for businesses prioritizing data protection.
  • Users report that Akeyless Platform excels in API/Integrations with a score of 8.9, while TokenEx scores 9.8. Reviewers mention that TokenEx's extensive API capabilities allow for seamless integration with various applications, which is crucial for businesses looking to streamline their operations.
  • Reviewers mention that TokenEx's Audit Trail functionality, scoring 7.6, is an area for improvement compared to Akeyless Platform, which offers more robust auditing features. Users on G2 express a desire for more detailed tracking and reporting capabilities in TokenEx.
Pricing
Entry-Level Pricing
Akeyless Identity Security Platform
No pricing available
IXOPAY
No pricing available
Free Trial
Akeyless Identity Security Platform
Free Trial is available
IXOPAY
No trial information available
Ratings
Meets Requirements
8.9
61
9.6
17
Ease of Use
9.0
60
9.3
17
Ease of Setup
8.2
49
9.3
14
Ease of Admin
8.7
42
9.0
14
Quality of Support
9.2
55
9.8
17
Has the product been a good partner in doing business?
9.7
41
9.9
14
Product Direction (% positive)
9.6
55
9.3
16
Features by Category
Encryption Key ManagementHide 10 FeaturesShow 10 Features
9.1
24
Not enough data
Functionality
9.2
22
Not enough data
9.2
17
Not enough data
9.2
20
Not enough data
Availability
8.8
20
Not enough data
9.2
19
Not enough data
9.4
18
Not enough data
9.4
21
Not enough data
Administration
8.8
19
Not enough data
9.4
18
Not enough data
9.0
20
Not enough data
Not enough data
Not enough data
Payment Processing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Payment Options
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
8.9
18
Not enough data
Administration
8.9
18
Not enough data
8.5
10
Not enough data
9.0
16
Not enough data
8.4
15
Not enough data
9.2
16
Not enough data
9.2
14
Not enough data
Functionality
9.9
13
Not enough data
9.8
16
Not enough data
9.8
11
Not enough data
9.2
14
Not enough data
9.4
15
Not enough data
9.3
17
Not enough data
8.6
12
Not enough data
9.3
9
Not enough data
9.4
16
Not enough data
9.2
15
Not enough data
Monitoring
8.6
15
Not enough data
8.4
16
Not enough data
8.8
10
Not enough data
Reporting
8.2
17
Not enough data
8.3
15
Not enough data
Data De-IdentificationHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Connectivity
Not enough data
Not enough data
Not enough data
Not enough data
Certificate Lifecycle Management (CLM)Hide 9 FeaturesShow 9 Features
9.9
9
Not enough data
Functionality
10.0
5
Not enough data
10.0
5
Not enough data
10.0
5
Not enough data
9.7
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
9.3
5
Not enough data
10.0
6
Not enough data
Payments OrchestrationHide 16 FeaturesShow 16 Features
Not enough data
Not enough data
Architecture
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Processing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk & Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Payments Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Secrets Management ToolsHide 3 FeaturesShow 3 Features
8.2
30
Not enough data
Functionality
7.5
26
Not enough data
8.5
26
Not enough data
8.5
25
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Monitoring - IT Risk Management
Not enough data
Not enough data
Agentic AI - IT Risk Management
Not enough data
Not enough data
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
29
Not enough data
Usability & Access
9.3
28
Not enough data
8.1
25
Not enough data
7.3
18
Not enough data
8.6
22
Not enough data
8.8
26
Not enough data
Security Measures
9.0
22
Not enough data
9.3
23
Not enough data
Feature Not Available
Not enough data
Storage
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
9.4
10
Encryption
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
10.0
7
Not enough data
10.0
8
Not enough data
Not enough data
Not enough data
Feature Not Available
Compliance
Not enough data
10.0
6
Not enough data
Not enough data
Not enough data
9.3
5
Management
Not enough data
7.8
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Akeyless Identity Security Platform
Akeyless Identity Security Platform
IXOPAY
IXOPAY
Akeyless Identity Security Platform and IXOPAY are categorized as Encryption Key Management
Reviews
Reviewers' Company Size
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Small-Business(50 or fewer emp.)
20.8%
Mid-Market(51-1000 emp.)
29.9%
Enterprise(> 1000 emp.)
49.4%
IXOPAY
IXOPAY
Small-Business(50 or fewer emp.)
47.1%
Mid-Market(51-1000 emp.)
41.2%
Enterprise(> 1000 emp.)
11.8%
Reviewers' Industry
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Information Technology and Services
15.4%
Computer Software
12.8%
Marketing and Advertising
10.3%
Insurance
9.0%
Financial Services
9.0%
Other
43.6%
IXOPAY
IXOPAY
Financial Services
17.6%
Computer Software
17.6%
Retail
11.8%
Telecommunications
5.9%
Sports
5.9%
Other
41.2%
Alternatives
Akeyless Identity Security Platform
Akeyless Identity Security Platform Alternatives
HashiCorp Vault
HashiCorp Vault
Add HashiCorp Vault
1Password
1Password
Add 1Password
Egnyte
Egnyte
Add Egnyte
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
IXOPAY
IXOPAY Alternatives
VGS Platform
VGS Platform
Add VGS Platform
Egnyte
Egnyte
Add Egnyte
PayPal Payments
PayPal Payments
Add PayPal Payments
Stripe Payments
Stripe Payments
Add Stripe Payments
Discussions
Akeyless Identity Security Platform
Akeyless Identity Security Platform Discussions
Monty the Mongoose crying
Akeyless Identity Security Platform has no discussions with answers
IXOPAY
IXOPAY Discussions
What is tokenization?
1 Comment
Official Response from IXOPAY
Tokenization is the process of exchanging sensitive data for nonsensitive data, called a "token." Once this is done, the token cannot be returned to its...Read more
Monty the Mongoose crying
IXOPAY has no more discussions with answers