Secure your software and data

Find the perfect escrow plan for your software development and licensing needs.

DEVELOPER PLAN

$ 59

per month

Setup Fee

$ 199

2 Source Code Vaults

2 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

TEAM PLAN

$ 149

per month

Setup Fee

$ 199

5 Source Code Vaults

10 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

BUSINESS PLAN

MOST POPULAR

$ 299

per month

Setup Fee

$ 199

15 Source Code Vaults

30 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

ENTERPRISE PLAN

$ 899

per month

Setup Fee

$ 199

100 Source Code Vaults

50 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

DEVELOPER PLAN

$ 615

per year

Setup Fee

$ 199

2 Source Code Vaults

2 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

TEAM PLAN

$ 1,554

per year

Setup Fee

$ 199

5 Source Code Vaults

10 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

BUSINESS PLAN

MOST POPULAR

$ 3,120

per year

Setup Fee

$ 199

15 Source Code Vaults

30 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

ENTERPRISE PLAN

$ 9,380

per year

Setup Fee

$ 199

100 Source Code Vaults

50 Escrow agreements

Concierge-Supported
Onboarding

GET STARTED

Trusted by organizations across the globe

Features

No matter your plan level, we are committed to ensuring you get the most
robust features, the highest level of service, and the best price on the market.

Included

All accounts include:

Free Escrow Agreement

Unlimited Continuous Deposits

No lawyer fees or hidden

Escrow activation beneficiary confirmation

Escrow Agreements

Choose from these agreement types:

Software Licensing Escrow

Software Development Escrow

Software Transaction Escrow

Software-as-a-Service Escrow

Secure Vaults

Choose from these vault options:

Source Code Vault

Data Vault

Information Vault

Storage Locations

Need to limit storage to a specific region?

All regions of the world

Source Code & Data

Complete end-to-end encryption

HIPAA & GDPR Compliant

Data Escrow

We offer different data escrow setups:

Snapshot Upload (included with Data Escrow Vault)

Mirror Streaming (Request Quote)

Data Verification possible

Amazon S3 direct deposit connections ($29/month)

Legal Options:

Configure the escrow agreement to your needs:

Two or three-party (including beneficiary)

Select from different legal jurisdictions

Include verification requirements

Configured by concierge during onboarding

Get an offer made just for you

Don’t see a plan that meets your needs?
Send us your current requirements, and we’ll send you a tailored offer.

Understand our features

Check out the glossary below and discover how to protect
your software and databases.

  • Source Code Escrow

  • Source code escrow is an agreement set up between a software developer or vendor (aka “Depositor” or “Licensor”), their client who is purchasing the software license (aka “Beneficiary” or “Licensee”), and a trusted third party such as Codekeeper (“Escrow Agent”). In particular, source code escrow puts a contractual obligation on the depositor to store—with a trusted escrow agent—all source code, data, build instructions, third-party tools, and anything else that would enable the beneficiary to update or maintain the software. Read more
  • Secure Vault Options

  • You have total control over your plan usage with Secure Vault. Each plan comes with a number of Secure Vault Options that you can choose to fill with: source code repositories, data storage vaults or information vaults.
  • Software Escrow

  • “Software escrow” and “source code escrow” are terms that are used interchangeably. This is the most common type of escrow, and it is designed to store not only source code but also build instructions and any other important documentation that would allow a beneficiary to update and maintain a mission-critical software application. Though software escrow is most commonly used for traditional on-site software licenses, it can also be used for development agreements, software acquisition agreements, SaaS applications (see below), and any other transactions involving software.
  • Data Escrow

  • Data escrow applies to custodians of data, such as service providers or internet domain registries, and it ensures that up-to-date copies of domain name ownership and contact details are held in escrow in the event of a registry’s business or technical failure. Sometimes it is used in tandem with domain escrow, which holds the credentials of a domain and helps reduce risk when purchasing a domain or using a domain as collateral. Just like source code escrow, data and domain escrows ensure that up-to-date copies of data and other predetermined deposit materials are held in escrow by a trusted third party such as Codekeeper, which releases the materials only when one or more release conditions has been met.
  • Information Escrow

  • Information escrow allows companies to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. Specifically, in the business context, it assists companies with securing sensitive documents, which can only be released under certain predefined conditions. Information escrow is most commonly used when part of the product development process is outsourced to a third-party designer; or when a transaction is taking place, and a trusted third party is required to store the documents until certain milestones are met. It is also frequently used to hold intellectual property and other sensitive and confidential information that can be stored physically, electronically, or in the cloud
  • SaaS escrows

  • SaaS escrow is similar to a regular software or source code escrow. However, it is tailored to the unique needs of Software-as-a-Service (SaaS) applications, which often require a more robust solution to obtain a required level of protection. Much like software escrow, SaaS escrow contains code, virtual machines, data, and any other components necessary to ensure a SaaS product remains viable in the event the original vendor is no longer able to support it. By establishing a SaaS escrow agreement, a company that subscribes to a SaaS application (beneficiary) protects itself from a potential sudden loss of access to critical SaaS services—whether temporary or long-term—and secures direct access to a running copy of the software and their own customer data in case release conditions are met.

Getting Started with Source Code Escrow

Read our guide to learn how source code escrow can help you minimize risk and ensure your mission-critical systems remain unaffected through any circumstance.

DOWNLOAD FREE GUIDE

FAQ

Frequently asked questions, answered.

  • Do you also support other source code deposit methods?

  • All accounts include unlimited continuous deposits. We also support SFTP, Dropbox, Google Drive, email, and others. Let us know your needs and we’ll make it work.
  • Can you tell me more about how you protect data?

  • Deposited source code is encrypted in a single process when the deposit is made. The encrypted source code is backed up at different locations around the world. The decryption keys are in our safes, which are inside a bank building. The codes only come out when a release event occurs.
  • Can you provide us with a copy of the escrow agreement?

  • Click here to access our free sample escrow agreement!
  • What payment methods do you support?

  • We support all major credit cards. As subscriptions are processed using Chargebee and payments are processed using Stripe, you may see these names appear on your credit card statement.
  • Will I get a VAT invoice?

  • Yes. If you enter your VAT information during sign-up, you'll receive an invoice specifying the VAT amounts. All listed prices of Codekeeper services do not include VAT.
  • When does the escrow process start?

  • Once you sign up for your Codekeeper plan, you will receive onboarding information via email. This email will also include links to register your repositories and to add counter parties to them. We'll support you through the process to get all your code secured quickly and easily.
  • Does Codekeeper have access to the content that's deposited under escrow?

  • No. To ensure complete security and guarantee full integrity, the deposited materials are encrypted and stored in an automated process.
  • Where is the code under escrow stored?

  • We back up all encrypted escrow content at several undisclosed locations around the world. If you have regional data storage restrictions, we can accommodate them.
  • In which countries do your operate?

  • We have offices in the US and in The Netherlands, and we are a trusted partner of great companies from all around the world.
  • Do you offer data escrow services?

  • We offer different data escrow setups. Snapshot Upload is included with our Data Escrow Vault, and you can request a quote for Mirror Streaming. We also offer Data Verification, as well as Amazon S3 direct deposit connections at $29 per month.
  • What types of escrow agreements do you offer and how do they differ?

  • Agreements for all types of escrow (software licensing escrow, software development escrow, software transaction escrow, and SaaS escrow) follow the same format. For all intents and purposes, they are virtually the same; however, the terms of your agreement can be tailored to meet your specific requirements with regard to your agreement with the licensor or licensee. Our experts ensure each agreement is legally-sound, which helps you save on lawyer fees.
  • Can I change my plan?

  • You can make changes to your plan at any time. If for instance, you start on the Developer plan, you can upgrade to the Team plan or Business Plan at any later time. Please note that we do not offer refunds for downgrades. To change your plan, just send us an email with your new requirements; we will validate the necessary configuration and send you a custom offer to ensure you’re only ever paying for what you really need.
  • How secure is Codekeeper?

  • Protecting the data you entrust with Codekeeper is our first priority. We use physical, procedural, and technical safeguards to preserve the integrity and security of your information, and we regularly back up your data to prevent loss and aid in recovery. Codekeeper works with partners who implement strict security requirements and protocols to secure your data, such as ISO/IEC 27001 and ISO/IEC 27018. Additionally, we host data in secure SOC2 certified data centers, implement firewalls and access restrictions on our servers to better protect your information, adhere to the strictest data protection laws, proactively monitor the system 24/7, and undergo third-party annual security audits and assessments to ensure our practices adhere to the highest security standards. Learn more about our security practices.
  • How long has Codekeeper been providing software escrow services? Which companies do you work with?

  • Codekeeper was founded in 2013 in The Hague, Netherlands. Over the past seven years, we have earned the trust of thousands of great companies from all over the world thanks to our cutting-edge technology and market-leading pricing. Renowned global brands like Intuit, GE, Pepsico, Nestlé, P&G, Daimler, and many others rely on Codekeeper to ensure their mission-critical systems remain unaffected throughout any circumstance. Today, we have a second office in San Francisco, California, and our operations are rapidly growing on a global scale. We have experience with clients in jurisdictions across all regions of the world, including Europe, North America, Asia, and others.
  • Is there someone I can speak to over the phone?

  • If you're interested in finding out more about how Codekeeper can help you minimize risk and protect your mission-critical systems with software escrow, we'd love to show you around our platform and answer any of your questions. You can schedule a 30-minute demo call with one of our specialists here. If you're an existing client, we are required to communicate with you exclusively in writing for compliance reasons; please email us at any time and we will assist you promptly.
  • Show more questions +

Haven’t found the answer you were looking for?

Contact us

We operate inside the ISO27001 security framework. Our datacenter certifications: