 Good afternoon and welcome back to Chicago. We are here at KubeCon and CloudNativeCon, the CloudNative Foundation's largest North American event. My name is Savannah Peterson, joined by my co-host, John Furrier. Afternoon, day one, how you feeling? Great, great lunch, as always. The sandwiches. Love it, shout out for the sandwiches here. It's an inside joke, everybody knows KubeCon. They do a good job getting the factory going, but the energy's here, it's packed, Savannah. This is, again, the innovations here, so excited to have all these great, smart people here with us. Yeah, I'm definitely feeling the energy. I'm juiced. I'm very excited about this next conversation. And before we even get into the tech portion of this, we're here with Odin. You're our first Israeli company of the show. How are you doing emotionally? How's the team holding up? Well, first of all, we're very proud to be here, all right, very proud to show the way that Israeli companies are reacting to this very sad situation we're at. We're here, we're active. The business continuity, also, not just for Achilles, for the entire Israeli companies coming here from Tel Aviv, and we have lots of those. It's touching, it's exciting to see the spirit, although everything is happening. Surely at the first beginning of, you know, after the sad 7th of October, there was a few days of serious shock. By the way, part of our employees and part of other employees were called on duty. But we're here basically also to say that we continue, we continue to serve, we continue to be here as part of the industry and to think about the days after the war. But yeah, with that, please. Yeah, well, I really appreciate that. Thanks for sharing. And the entrepreneurial culture shines through, and we're with you on that, by the way. Yeah, well, the culture of the Israeli spirit is something that I'm sure that being in the industry, you've met all of those different companies coming from Israel. It's coming down, we're bringing that, and we breathe that whenever we are, you know, very early on our childhood, right? To get up on our feet, always improvise, always react, always be positive to what's going on. As despite the very sad or horror things that are happening and all the political situation around it, obviously. We appreciate you. Well, you guys are doing, continuing to do your business. Congratulations, love the shirt, by the way. Love the logo. All right, thank you. A big fan of swag here on theCUBE. You guys got a really cool solution. What's going on here at KubeCon? Tell us what's going on in your business right now. Well, obviously, you know, we see great people here in great companies that are interested, and we're here to serve the guys that are interested around secrets management. So this is what we came to speak about, and to basically communicate our vaultless approach. So, vaultless, by the way, just to get you within it, and what's special on that. And you've mentioned our name, you've mentioned our logo. A-keyless is basically a shortened for A-keyless encryption. Something from the cybersecurity world, right? But we basically started five years ago with a great technology called DFC, our Distributed Fragments Photography, from the world of security, and we've built that into a SaaS service to combine a vaultless approach. What does this mean? We basically created a third generation for a solution within the realm of secrets management, where secrets are sprawled away in the environments in the last few years. We've had more and more of those credential certificates and keys that scroll within DevOps platforms, within configuration files and all of those. And it happens to be that the majority of solutions were basically self-managed, very hard to deploy, very hard to maintain, and also hard to scale. And this is where we understood that we can combine our technology to perform encryption in a very special way, in a secure way, in a zero-knowledge way, that we cannot basically decrypt the secrets of our customers. This is what allows us to provide a SaaS service, so having secrets management as a service worker. It's a secret service, it's a secret service. Wow, John, wow, 10 out of 10 for the pun, killing the game here in the afternoon. Someone had their coffee. I'm bringing my egg in today. So let's get into the problem solving. I get the sprawl factor, okay? Attack surface area is there. What's the key problem that you guys are solving? Is it the sprawl of too many secrets laying around, managing of secrets? Is it a technical problem? What is the space? All right, so going back, first of all, yes, a secret sprawl out of the bat. This is basically where we're at, all right? Now it's important to understand that obviously credential certificates, keys, they've been here for a while, right? It's here for years. If you go for a cybersecurity convention, right, a conference, you'll hear it more and more and more. It's like old news. That said, the last few years, what we were seeing is that in seven to 10 years, we're seeing basically within the cloud world, within the DevOps world, right? We see a rise in the number of machines, automated processes, right? Community spots, right? We see all of that happening. Automated processes, virtual machines, whatever you like, all right? And obviously, automated processes within the platform, within the DevOps platform, and provisioning, infrastructure as code, all of those different types. Basically, they operate with credentials. Now, when break of the monolith happens, back in the days, well, it's seven years and it sounds like in history, right? Basically, it means that every component that now basically combines to a whole application, each and every one of those components, microservices, micro functions, if you'd like, they need to communicate with each other and they need to do so using lots of those secrets, credential, certificates, and keys. So, this is where you get a big boom or a rise in the number of machines and the number of secrets, hence the secret scroll. And hence, bottom line is the number of actual breaches that happen with those credential, certificates, and keys. That's it. This is the main problem that happens and this is why secrets management have been created. Who's the buyer? Who's the user? Is it the platform engineering manager? Is it, and who's the user? What's the buyer user relationship? So, we see both. So, we see both of them. We see the platform and we see also the security. This is one of the good places where we see great cooperation happens between the platform guys, the SREs, the DevOps guys, also with their security, the application security, SecOps, DevSecOps, all of those altogether, they go hand in hand. Because at the end of the day, having that to be a security infrastructure, then the check payer is, you know, eventually the one who signs the checks are the security guys, right? So, this is where we find again and again and again. Vaultless seems to be a bit of a game changer in this space and imperative for enterprise. Can you tell us a little bit more about that? Sure, of course. So, just as provided as a sneak peek three minutes ago, now we can go even dive into that. Yeah, let's dive in. DFC is the technology we started with, which stands for Distributed Fragments Cryptography, right? Sounds frightening for the ones that are not being familiar with cryptography, that's fine, but to describe it in very simple words, Aqylus has the ability to perform cryptographic operations using fragments of encryption keys without ever combining them. We have those fragments on different cloud providers, for that sense, from different reasons, cloud providers. And during the encryption itself, the encryption itself does not ask for those fragments to be combined whatsoever, all right? This is why we call it Aqylus encryption, right? Now, using that model, which is again a patented technology of ours, using that model, we also have the ability to have another fragment on the customer side. That means that whatever has been encrypted by Aqylus, passwords, signed certificates that we signed with a cryptographic key, whenever we're done with that, we don't have the ability to basically decrypt the customer's secrets, right? Because they keep it within our SaaS, and that's the combination of our DFC with the SaaS service that is available all around the world, right? With 4.9's availability, you can find it with every region that you'd like, no deployment required, you're just signing up to the website and you're enjoying the vaultless approach, a vault from the very first moment all around. So one of the things that's come up here at CloudNativeCon and CubeCon is dynamic secrets. Or machines talking to machines, we're going to see a lot more AI coming. Pipelines, data pipelines are emerging, data engineering is coming here, models talking to each other. This is not going away. Some sort of management of identification, passwords, certificates, but automatically generating keys and secrets is a huge issue. What stands up, when do you tear it down? What do you guys do there? For the ones who do know the security realm, even before the days of DevOps, if you can call it this way, to speak about dynamic credentials and the ability to have just-in-time access, that has been, again, a known notion that unfortunately the security industry was not very able to do or to implement because mostly the environment were fixed, they were static. The great news about Cloud, and I guess that you hear it again and again everything is dynamic, everything is ephemeral by nature. That means that whenever you have a community spot, right spins up, like a container that spins up, then basically the resources are being used for a certain amount of time, and then they are being released. Now, combining it with the need of security to actually have those identities to be created upon usage, upon need, and also to be released. It's also resources are being released, but also the security resource, the permission can be released. Combining all together, that enabled a new conversation with the realm of just-in-time access, temporary credentials, dynamic secrets, whatever you call it, it's the same name, but the whole thing, and the great beauty of it, by the way, is that at the end of the day, at the end of the year, when an auditor comes up and they ask, all right, show me your database. Show me the credentials that you have, the amount of identities they have on your database, and they are actually surprised to see that there are quite few, and they're saying, the auditors are saying, how is that? How did that happen? And then the explanation is, because permissions and identities are created whenever they're being used and released. So you guys do support that feature. Of course, we support that. We support also something that you might not find that wide on any other vault solution, which is the wide variety of rotated secrets that we provide. You can basically rotate not just Windows machines, not just Linux machines, but also of the newer world, right? You can basically rotate also API keys. We provided a custom rotation function, so you can basically do whatever you need in terms of rotating, creating dynamic credentials. We also have custom provider for that. And yeah, that's it. We, you're able to, you mentioned just in time, so also with creating temporary certificates, so we act as certificate authority. We provide also encryption keys management and so on. Okay, tell me about your customer environment, partnerships you might have to explain what you bring to the table, and what would they say about you when they use your product? What are some of the things that would they tell you about the accolades you're getting? What does it change in their world? Obviously, obvious one is obviously more security. Yeah, brag a little bit for us. It's more security. But listen, don't push me too much, but listen, to be very clear and open and very simple in words, our customers are saying that we're the number one alternative for HashiCore Vault. This is what they're saying. I'm quoting, right? Why do they say that when you ask them? It's a wider functionality. It's an enhanced security, right? Much easier to deploy, much easier to work with given a SaaS nature, right? And at the bottom line, we provide 70% reduction on TCO comparing to the competition. And this is what brings the customers to us. We find rep and replace projects. We find a lot of green fields and we're very happy to do so. That's awesome. Who are you partnering with on this voyage? Sure, so for a long time, actually we've done a lot of direct, but we do have some local partners and VARs both in Europe, in the international market and in the U.S. We recently added and been chosen by a strategic partner named TALIS, right? TALIS Security, known for their encryption keys management, data protection and such. Later, they've done also a great acquisition that is waiting for approval in very adjacent areas. But bottom line, we have partnered with them. TALIS are very proud and also very excited for this partnership. They basically bring Achilles as part of their Cypher Trust secrets management, Cypher Trust platform. We're literally embedded there and goes hand in hand to provide a platform approach. Yeah, and this is how we do it. It sounds like you do it with vigor and speed and ease, which is a great way to do it. What's next? What are you most excited about beyond? Can you give us a little window in the future? Of course, so what we're very happy to have is something that we see more and more goes from our product and engineering comes and provides greater with time is our extensions. We understood quite from the beginning from our customers is that we have a great opportunity to serve them in what we call the last mile. Secrets management is very much an adjacent area to lots of other areas, such as privileged access management, certificate automation, key management, and also password management, the classic one with a mobile app, et cetera. So you're going to see more and more innovation coming up from AQLIS. Some of it, the things that I've mentioned are already available, such as our secure mode access offering. We have at least one third of our customers to basically adopt the secure mode access, which is a lighter PAM, a lighter privileged access management solution. How do customers get involved? You mentioned the cloud servers, that's awesome. So onboarding, just come in. What's the, take us through how they engage with you. AQLIS.io, A-K-E-Y-L-E-S-S.io, sign up. They're on your shirt. Yeah. That's it, and you're done. Whenever you're signing up, you're submitting your email, and from that very moment, you're enjoying a multi-cloud operation, four nights of availability, 24 hours all around the globe. That's it, you're already scaled. Easy to get into. Easy to get into, right? Right, you know, everything is well documented, everything is well explained. There are videos, tutorials, whatever you need. What's your secret sauce? The secret sauce. Secret sauce? So our secret sauce is our DFC, by the way, which I've already provided to you. But yeah, it is a secret. So you guys got some good technology. Congratulations, and thanks for coming on theCUBE. Appreciate it. Thank you so much. Yeah, yeah, Odette, I'm really impressed. I got one last little question for you, because we've asked a few people. There's a couple of dinosaurs out on the floor. Do you have a favorite dinosaur? I would pledge for the fifth on that one. Oh, a secret favorite dinosaur. Wow, okay, this is appropriate that you're not going to incriminate yourself, that you're keeping your own secret. I'm not going to provide secrets around that. You're probably keeping their secrets somewhere bulbous. Now I'm the one doing the puns. Odette, thank you so much for being here. Thank you for having me, guys. We really appreciate it. All right. Our thoughts, I know I speak on behalf of the entire CUBE team. Our thoughts are with you in Israel and with your team. Thank you so much. And we really hope that this helps. Thank you, I appreciate that. And the name of the CUBE and all other Israeli companies in this conference, thank you so much. May we end terrorism sooner rather than later. John Furrier, thanks so much for being my co-host. My name's Savannah Peterson. We're here in the wonderful Windy City of Chicago in Illinois at CUBECon and CNCF's Cloud NativeCon. Thank you so much for joining us here on the CUBE, the source for emerging tech news.