diff --git a/website/source/intro/vs/keywhiz.html.md b/website/source/intro/vs/keywhiz.html.md
index 78bb30be82..84fcf2e7f8 100644
--- a/website/source/intro/vs/keywhiz.html.md
+++ b/website/source/intro/vs/keywhiz.html.md
@@ -9,31 +9,34 @@ description: |-
# Vault vs. Keywhiz
Keywhiz is a secret management solution built by Square. Keywhiz
-has a client/server architecture. Clients of Keywhiz make use of
-a FUSE filesystem to expose secrets as files on disk, and use Unix
-file permissions for access control. Underneath, the Keywhiz clients
-use mutual TLS (mTLS) to authenticate with a Keywhiz server, which
-serves secrets.
+has a client/server architecture based on a RESTful API. Clients of
+Keywhiz access secrets through the API by authenticating with a client
+certificate or cookie. To allow for flexible consumption of secrets by arbitrary
+software, clients may also make use of a FUSE filesystem to expose secrets
+as files on disk, and use Unix file permissions for access control. Human
+operators may authenticate using a cookie-based authentication either via command
+line utilities or through a management web interface.
Vault similarly is designed as a comprehensive secret management
-solution. The client interaction with Vault is much more flexible,
+solution. The client interaction with Vault is flexible
both for authentication and usage of secrets. Vault supports [mTLS
authentication](/docs/auth/cert.html) along with many [other
mechanisms](/docs/auth/index.html). The goal being to make it easy to
authenticate as a machine for programmatic access and as a human for
operator usage.
-Vault exposes secrets via an API and not over a FUSE filesystem. The
+Vault and Keywhiz expose secrets via an API. The Vault
[ACL system](/docs/concepts/policies.html) is used
-to protect secrets and gate access, and depends on server side enforcement
-instead of Unix permissions on the clients. All auditing is also done
+to protect secrets and gate access, similarly to the
+Keywhiz ACL system. With Vault, All auditing is done
server side using [audit backends](/docs/audit/index.html).
-Keywhiz focuses on storage and distribution of secrets and decouples
-rotation, and expects external systems to be used for periodic key rotation.
-Vault instead supports dynamic secrets, generating credentials on-demand for
-fine-grained security controls, auditing, and non-repudiation. Key rotation
-is a first class concern for Vault, so that no external system needs to be used.
+Keywhiz focuses on storage and distribution of secrets and supports
+rotation through secret versioning, which is possible in the Keywhiz UI and
+command-line utilities. Vault also supports dynamic secrets and generating credentials
+on-demand for fine-grained security controls, but adds first class support
+for non-repudiation. Key rotation is a first class concern for Keywhiz and Vault, so
+that no external systems need to be used.
Lastly Vault forces a mandatory lease contract with clients. All secrets read
from Vault have an associated lease which enables operators to audit key usage,