Atlassian Williams F1 secures global ops with KeeperPAM
Keeper Security has deployed its Privileged Access Management product KeeperPAM at Atlassian Williams F1 Team, as Formula 1 organisations face growing exposure from travelling operations and data-heavy engineering workflows.
The companies said the implementation covers privileged access and remote connections used across the team’s global footprint. The arrangement sits alongside a new case study published by Keeper Security about the project.
Formula 1 teams run distributed IT environments that span factory operations, trackside systems and staff who move from country to country during the race calendar. They also handle large volumes of sensitive telemetry and performance data.
Atlassian Williams F1 Team said its security requirements reflect that reality. The team runs infrastructure that travels between venues and connects from a wide variety of networks.
“We travel to more than 20 countries each season, and every week we’re in a new location,” said James Vowles, Team Principal, Atlassian Williams F1 Team. “Our infrastructure isn’t sitting safely in a single building - it’s traveling with us. That means we have to be secure wherever we are, from airports to garages to our HQ at Grove. With Keeper, we can build that fortress around our operations.”
Single Platform
Keeper Security positions KeeperPAM as a unified platform for privileged access. The company said the deployment gives Atlassian Williams F1 Team a single point of control for connections that require elevated access.
Harry Wilson, former Head of Information Security at Atlassian Williams F1 Team, described the operational focus in terms of policy enforcement and monitoring.
“We now have a single platform where all of our connections go through,” said Harry Wilson, former Head of Information Security, Atlassian Williams F1 Team. “We can apply policies, monitor usage and generate alerts when something unexpected happens. Doing that on our server estate was critical to us.”
Keeper said its product uses a zero-trust model and a zero-knowledge design. In the Privileged Access Management market, vendors commonly frame these approaches as limiting implicit trust and reducing exposure of sensitive credentials.
The company said the platform includes features such as role-based access controls, privileged session monitoring and automated provisioning. It also lists password management, secrets management, endpoint privilege management and secure remote access as elements of the suite.
Admin Access
Privileged Access Management often centres on controlling administrative rights. These rights can create risk when they persist longer than needed or spread across accounts and devices.
Wilson said the team needed case-by-case elevation for local administrator rights.
“There are times when employees need local admin rights on a case-by-case basis,” said Wilson. “With Keeper, we can grant that access in real time and remove it automatically, which gives us confidence that privileged access is always controlled and temporary.”
Keeper said Atlassian Williams F1 Team centralised credentials within what it described as a zero-knowledge platform. The company said the approach automated provisioning and deprovisioning for privileged access.
Operational Demands
Race-weekend timelines compress decision-making and technical change windows. Teams also need predictable access controls for engineers and support staff across trackside and factory environments.
Keeper said the system reduced complexity compared with legacy tools. It also said the product provides visibility and alerting for privileged access activity.
Craig Lurey, CTO and Co-founder of Keeper Security, pointed to automation as a core design goal for modern Privileged Access Management tools.
“Modern PAM has to do more than secure credentials. It has to automate provisioning, rotate secrets and eliminate standing privileges - all without burdening IT teams,” said Craig Lurey, CTO and Co-founder, Keeper Security. “That’s why we designed KeeperPAM to replace complexity with automation, freeing organizations like Atlassian Williams F1 Team to focus on what they do best.”
Keeper Security said the work with Atlassian Williams F1 Team reflects broader interest in Privileged Access Management as organisations contend with remote access, distributed workforces and increasing identity-related threats.
The companies did not disclose financial terms, the duration of the agreement, or the number of users covered by the deployment.
Keeper Security said Atlassian Williams F1 Team can operate across networks and devices using the platform, while retaining controls around privileged access and monitoring of sessions.