<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">
Software Escrow

Protect your on-premises software

Secure your source code, data, and documentation with verified Software Escrow vaults and certified recovery plans.
From
$129
/mo
Software Escrow app screenshot
Airbus partner logo
Bayer partner logo
EU Parliament partner logo
General Motors partner logo
Intuit partner logo
Nestle partner logo
Pepsico partner logo
Pfizer partner logo

Can you recover your software whenever you need to?

Diagram explaining what Software Escrow is.

What is software escrow?

Software escrow is a three-party agreement between vendors, users, and Codekeeper. Vendors deposit source code, data, and documentation. We secure these materials. When specified failure conditions occur, we release them to users who need to maintain the software independently.
Software escrow guards against:
Vendor bankruptcy that eliminates support overnight
Product discontinuation that forces costly migrations
Security vulnerabilities you can't patch yourself
Contract disputes that freeze your operations
Lost enterprise deals due to missing continuity guarantees

Download our Introduction to Software Escrow guide

We make sure your software never lets you down

We know how much rides on your on-premises software — every process, every client, every day. That's why we built software resilience solutions that protect your code and preserve your business. Codekeeper is trusted by 3 500+ businesses globally. You can rely on us too.
Four people in a meeting looking at a laptop together.

How Software Escrow works

calendar-fold
1. Book a free consultation
Talk with our escrow specialists about which assets to secure and how escrow can eliminate your software risk.
mouse-pointer-click
2. Choose a protection level
After you select your plan, we configure your vault and prepare your agreement framework based on your needs.
cloud-upload
3. Deposit your assets
You can connect your repositories for automatic daily syncs. Or upload your materials manually. We support both. 
file-badge-2
4. Certify your resilience
We examine your deposits, test recovery readiness, then issue your Software Resilience Certificate.
Book a demo
"Codekeeper lifted us at every turn, from setting up the escrow agreement, handshaking the agreement with all parties, and using the tool to get the repositories in sync. I'd spotlight the portal that walks you through each step — it builds trust for us and our clients alike — plus the technical setup that enables our teams to share code effortlessly. That combination simplifies everything and saves us real effort."
Paul T. *
Senior Managing Director
* Pseudonym used to maintain customer confidentiality.

What goes into your Software Escrow deposits

On-premises software escrow protection requires three essential asset types:
Computer screen displaying application source code.
Source code
The whole codebase required to build and deploy your application. 
Abstract visualization of databases and server machines representing business and user data.
Data
The databases, records, and information assets your software needs to operate. 
Person using a laptop at a table with papers and a pen, representing technical documentation.
Documentation
Technical knowledge that transforms source code into operational software.
Automated daily syncs
Unlimited deposits included
Dual-dashboard visibility

We sync with your systems

Codekeeper supports 50+ integrations to make it easy for you to add and manage your repositories. You connect your platforms once, and we sync your source code, data, and documents daily. No need to manage releases and versions or decide which repository belongs where.
View all integrations
Github integration logo
Bitbucket integration logo
Gitlab integration logo
AWS integration logo
GCP integration logo
Azure integration logo
Azure Devops integration logo
Shopify integration logo
Stripe integration logo
Chargebee integration logo

Full-service legal and technical support

Getting escrow protection right requires legal expertise and technical know-how. We provide both to make implementation straightforward.
Two people working on laptops with a snippet of an escrow agreement below.
Legal framework included
Our legal team drafts escrow agreements tailored to your specific needs — from standard templates to fully bespoke arrangements. 
Four people in a meeting with two shaking hands and an app snippet of an agreement form below.
Multi-party arrangements
We structure bi-party, tri-party, and multi-party agreements with clearly defined release conditions, verification requirements, and legal obligations.
Person working on a laptop with a screenshot of the “Jurisdiction” field overlaid.
Jurisdiction selection
Your escrow agreement operates under the jurisdiction that aligns with your business requirements, contracts, and regulatory obligations.
Four people, resembling customer support representatives, with a support app snippet at the lower right.
24/7/365 event processing
Reach us anytime — phone, chat, email — for urgent releases. Our always-available release processing service costs R3,499 per hour.
Unique in-app agreement management
24/7 technical and legal support
Guided implementation

Enterprise security and compliance built in

Securing sensitive source code requires enterprise-grade security infrastructure and audit-ready documentation. We designed our vaults for both.
Person using a laptop with a manual upload app snippet at the lower right, showing AES-256/512 encryption badges.
AES-256/512 encryption
All deposits are encrypted in transit and at rest using military-grade encryption standards.
Two people discussing with an app snippet showing asset version history at the lower right.
Version history
Every deposit is logged, and every change is recorded. You can also preserve every version with full audit trails.
Person using a laptop with an account verification app snippet at the lower left.
Multi-factor authentication access control
Granular permissions control who sees what, with role-based access and detailed audit logs of every action.
Global secure vault network
Immutable storage
Software Resilience Certificates included

Prove your deposits are recovery-ready

Escrow deposits need verification. Without it, you're trusting that materials are complete without proof they'll recover your software when it matters.
Two people discussing with a snippet of screens on the right, representing validated backup materials.
Validated
FREE
Automated checks ensure that essential materials are present.
Includes: Basic Software Resilience Certificate
Person using a laptop with an app snippet showing the “Your trust level” screen on the right.
Verified
Automated monitoring validates file integrity and content structure.
Includes: Enhanced Software Resilience Certificate
Group of people discussing with an app snippet showing verification certificates at the bottom.
Certified
Full technical build testing proves materials are functionally complete.
Includes: Premium Software Resilience Certificate
Compare all verification levels

Unprotected software puts everything at risk. 
Protected software gives you peace of mind.

Don't risk a software shutdown. Talk with our escrow specialists today about securing your on-premises systems. Your consultation includes:
Man using a laptop with the “Ready for recovery” screen displayed.

Frequently asked questions

What is software escrow?
Software escrow is a legal arrangement that protects licensed software users by ensuring continuous access to the software's source code and other critical materials. In a software escrow agreement, the software developer or vendor deposits a copy of the source code, documentation, and other essential components with a trusted third-party escrow agent, such as Codekeeper. This agent securely stores and manages these materials on behalf of the software provider and the beneficiary.
How does Software Escrow help you build digital resilience?
Software Escrow strengthens digital resilience by storing your on-premises software assets in a secure vault. If your live systems fail, you can restore operations quickly and maintain compliance without disruption.
For what purpose is software escrow most commonly used?
Businesses use software escrow to protect on-premise applications. It guarantees access to source code and critical assets, so vendors prove reliability to clients, and clients maintain functionality despite unexpected setbacks.
What is a software escrow agent?
A software escrow agent is a neutral third party — like Codekeeper — who securely holds your software materials. We manage deposits, verify usability, and release assets when agreed conditions are met to safeguard your recovery and continuity.
What is protected by a software escrow agreement?
A software escrow agreement protects source code, application data, technical documentation, and your IP. 
What are the release conditions for a software escrow agreement?
Release conditions trigger when specific events occur — vendor bankruptcy, discontinued support, or contract breaches. Once met, we provide immediate access to your deposited materials.
What proof of protection does Software Escrow provide?
You get a free basic Software Resilience Certificate with your Software Escrow plan. This documentation assures clients, auditors, and regulators that your materials are vaulted and validated.
What are the benefits of Software Escrow?
Software Escrow saves you $5,000 in legal fees with custom agreements, cuts 40+ hours of DevOps work with daily syncs, and secures your software with AES256/512 encryption. It boosts trust and keeps your business running smoothly.
Do we need Software Escrow if we have a disaster recovery plan in place?
Yes, because disaster recovery plans often lack source code access. Software Escrow fills that gap by securing code and data for on-premises apps — something backups alone can't promise.

Let's build bulletproof software resilience together.