To protect your Kubernetes environment from machine identity-related outages or data breaches, you need a clear understanding of the differences between cert-manager and CyberArk Certificate Manager for Kubernetes (formerly know as Venafi TLS Protect for Kubernetes). In turn, you’ll be well equipped to ensure the highest levels of protection for your cloud native applications.
Recommended for You

API keys are essential for securing application access, but when hard coded, reused, or stored insecurely, they become easy targets for attackers.

Machine identities now outnumber humans and often go unmanaged, creating serious audit and compliance risks. Download the guide to learn how to secure non-human access and improve audit readiness.

Running Kubernetes on Amazon EKS? You’re likely already using cert-manager—the open source standard for TLS and mTLS certificate automation in Kubernetes clusters. Today, we’re excited to announce...

CyberArk Secure Cloud Access combines just-in-time access and zero standing privileges to eliminate always-on access risk without slowing teams down.

As organizations embrace multi-cloud to boost innovation and agility, they face growing security and compliance risks.

As organizations modernize IT infrastructure, many are adopting platforms like OpenShift Virtualization to run both traditional virtual machines (VMs) and containerized workloads on a single,...

Join our joint webinar with Amazon and CyberArk security experts to learn how to manage secrets at scale while balancing the needs of your security and development teams.

Learn how Zero Standing Privileges can secure developer access in the cloud without hindering development productivity.

CyberArk Named an Overall Leader in the 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management.

Modern workloads operate across a complex landscape—cloud platforms, virtualized environments, data centers and SaaS applications. Each requires its own authentication method, from static...

CyberArk Secrets Manager, SaaS is a modern secrets management solution, designed to simplify and streamline the management of non- human secrets and credentials

In this guide, learn how integrating Istio service mesh with Kubernetes helps build robust environments and ensure the safety of certificates.

Discover how cloud native complexity impacts security in 2024. Learn key trends, challenges and solutions in machine identity protection.

A practical maturity model for securing secrets and reducing risks across Kubernetes environments.

Ensure enterprise-grade reliability and security for Kubernetes workloads with CyberArk Long Term Support for cert-manager. Download our data sheet now.

This solution brief explains how CyberArk provides FIPS 140-2 compliance for cert-manager—to help ensure high standards for cryptographic security.

In December 2024, a breach within the U.S. Treasury Department was traced back to a compromised API key. This attack underscores a growing security vulnerability that many organizations overlook:

Securing machine identities is critical, as recently evidenced by the breach of the U.S. Treasury Department.

In an era where identity is the cornerstone of security, understanding and effectively managing certificates and Public Key Infrastructure (PKI) is essential.

Sherman Becraft, Technology Owner at Elevance Health, researches the best vendors to trust. Watch his story to see why Elevance relies CyberArk!