1Password Targets Vault With Secrets Automation

Diving deeper into

1Password

Company Report
1Password launched Secrets Automation to compete with Vault by HashiCorp ($5B) on secret delivery at runtime
Analyzed 7 sources

This launch showed that 1Password was moving from storing human logins to powering machine access inside production systems. Instead of only helping employees save and share passwords, Secrets Automation let developers inject API keys, database credentials, and certificates into apps and scripts while they were running. That pushed 1Password into Vault’s territory, where the product sits directly in deployment and infrastructure workflows, and where enterprise budgets are larger and churn is lower.

  • The practical workflow is simple. Teams keep secrets in 1Password, then use Connect, CLI tools, or environment variable injection to pull those values into Terraform jobs, CI pipelines, containers, and apps at runtime, instead of copying them into code or config files by hand.
  • Vault was the natural target because it was built for this exact job, centralizing secrets and controlling which service can read what. 1Password approached the market from the other side, extending an already trusted employee vault into developer infrastructure, which made adoption easier for companies already standardized on 1Password.
  • This fit a broader enterprise expansion play. 1Password was already adding SIEM integrations like Splunk and Elastic so security teams could pipe usage events into existing monitoring systems, and later research shows B2B became 60% of revenue as the company moved deeper into access, device security, and devsecops workflows.

The next step is deeper ownership of non human identity, where the winning product becomes the default place to issue, inject, rotate, and audit credentials for apps, agents, and employees in one system. If 1Password keeps embedding into deployment and security tooling, it can move from a password manager budget line to core infrastructure spend.