Keeper

By Keeper Security, Inc.

Wheelhouse Score
4.10/5
Excellent
Rating
4.50/5
Excellent
Features
2.88/5
Above Average
Pricing
Economy

Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file storage. It offers a “zero-knowledge” security feature, which allows users only with access to the information being stored on the device and in the Keeper cloud security vault. The soluti...

Overview

Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file storage. It offers a “zero-knowledge” security feature, which allows users only with access to the information being stored on the device and in the Keeper cloud security vault. The solution synchronizes with multiple devices and can be used by multiple users. It allows users to create high-strength random passwords. Users can make password policies and monitor password compliance with

Keeper's dashboards, reporting, auditing and notifications.Keeper provides mobile security and data loss prevention and is compatible with desktop computers and mobile devices.

Key features include an IT admin console with password security enforcement, user provisioning, delegated administration and active directory integration.The solution uses 256-bit AES encryption, PBKDF2 key generation, perfect forward secrecy and two-factor authentication. The platform works with businesses of all sizes to integrate security, privacy and internal controls. Pricing is both per month and per year.

Packages

Keeper Business

  • Security Features
    • Compliance
    • User Provisioning
    • Analytics and Reporting
    • Device Control
    • Web Protection
    • Cloud Protection
    • Password Security Enforcement
    • Multi-Factor Authentication
    • Content Encryption
    • Remote Wipe
    • Dashboards
    • Encrypted Vaults
    • Security Audits
    • Team Management
    • Unlimited Device Access
    • Folders & Subfolders
    • Policy Engine & Enforcement
    • Password Management
  • Support Features
    • Telephone Support
    • Email Support
    • Online Chat
    • Webinars

Keeper Enterprise

Best Value
  • Security Features
    • Compliance
    • User Provisioning
    • Analytics and Reporting
    • Device Control
    • Web Protection
    • Cloud Protection
    • Password Security Enforcement
    • Multi-Factor Authentication
    • Content Encryption
    • Remote Wipe
    • Dashboards
    • Encrypted Vaults
    • Security Audits
    • Team Management
    • Unlimited Device Access
    • Folders & Subfolders
    • Policy Engine & Enforcement
    • Unified Directory
    • Adaptive Authentication
    • Developer APIs
    • SCIM
    • Command Line Provisioning
    • Email Auto-Provisioning
    • LDAP Sync
    • Automations
    • Password Management
  • Support Features
    • Telephone Support
    • Email Support
    • Online Chat
    • Webinars

Media

Pricing

Request a custom quote for your business

Recommended Articles

Cybersecurity Vs. Endpoint Security Vs. Hybrid Cloud Security

Properly securing your business workloads (whether they function on-site via proprietary servers or in the cloud) and...

5 Benefits of Managed IT Services

More companies than ever before are embracing cloud infrastructure, systems, and services to reap the business benefi...

4 Tips for Choosing Security Software Systems That Scale Along with Your Company Growth

Along with business innovation and growth comes the complexity of securing data, systems, and operations. With each i...

3 Reasons Cloud Security is More Important than Ever

Thanks to the availability and affordability of cloud-based infrastructure and business software solutions, the trend...

The Top 3 Companies Pioneering the IaaS Market

Cloud services and infrastructure companies such as AWS, Google Cloud, and Microsoft Azure give you all the tools and...

Anti-Virus Software Won't Protect Your Business

In today’s era of sophisticated hacks and with unprecedented levels of cybercrime and data breaches occurring, ...

4 Ways AI is Redefining Enterprise Security

Artificial Intelligence (AI) isn’t necessarily a new technology, but it’s been perceived more as a work o...

The Most Notorious Cyber Attacks Of the Past Decade

From Yahoo! to NotPetya - so much happened in the cyberspace during the course of these 10 years. Here's a flashback.

How to Protect Your Business from Known Cyber Security Risks

Maintaining tight cybersecurity within your business has some standard protocols - and the right security software is one of them.

Let's Make a Deal: Basic Steps for Switching to Cloud Computing

Moving your business data online doesn't have to be a scary proposition.

5 Steps Toward PCI DSS Compliance

The latest in credit-card protection requires a new approach.
Loading Reviews..