Every user is provided a secure and private vault. Keeper works on all device types, platforms and operating systems to allow users to:
Create and manage strong passwords across all device types.
Securely store files and other secret information.
Autofill passwords across web browsers, apps and mobile devices.
Share confidential information between users and teams.
Keeper is a Zero-Knowledge vault that is protected with multiple layers of encryption. Each user’s vault is protected by a Master Password which is used to encrypt and decrypt data on the local device. Two-Factor Authentication protects cloud access.
Security Note 1: The Master Password is used to derive an encryption key using PBKDF2, which is used to encrypt and decrypt the vault.
Security Note 2: Each password and file stored in the vault is protected with a separate strong 256-bit AES key.
Security Note 3: Users who login with Keeper SSO Connect integration don’t require a master password, as the encryption keys are managed by the Enterprise. Biometrics (Face ID, Touch ID, Windows Hello, etc.) can be permitted as a convenience factor.
Creating unique and strong randomly generated passwords for each website and service is critical to protecting against a data breach, password stuffing and password spraying attacks. Keeper’s password generator and auditing capabilities ensure compliance company-wide.
Keeper protects passwords and private information on all devices and operating systems. Deployment options are available through the Keeper Security website and every popular App Store. SCCM deployments and virtual environments (e.g. Citrix) are fully supported.
Keeper® Desktop App: Fully-featured desktop application for fast and secure access to your Keeper vault.
KeeperFill®: KeeperFill® is a browser extension that lets you autofill your login credentials in your favorite websites.
Keeper® Mobile App: Fully-featured mobile application for fast and secure access to your Keeper vault.
KeeperFill for web browsers provides a powerful and easy-to-use autofill feature. Various paths and scenarios are covered by the browser extensions, including the following:
Filling a login and password
Selecting from multiple passwords on the same website
Automatically filling a password (optional)
Prompting to fill or manual click to fill
Saving new passwords to the vault as you type
The ability to customize the behavior of the browser extension is covered in the Settings screen of the extension.
Keeper automatically detects password change forms on websites and can rotate your password to a strong auto-generated password with a single click. By using Keeper’s Security Audit screen, you can identity which accounts require an update. On the “Change Password” screen of the website, Keeper will automatically prompt you to update your password.
Keeper Desktop provides a unique and powerful native app form fill capability using a simple keyboard hotkey. IT admins who are accessing remote services can make use of this capability without having to resort to “copy” and “paste”. By storing all passwords in the vault and using KeeperFill for Apps, you can be assured that your application passwords are not stored anywhere in plaintext.
KeeperFill for Apps works across Mac and PC platforms with popular native applications such as:
Skype, Slack, Evernote and other productivity apps
Custom and/or proprietary applications
Remote Desktop, VNC, Terminal and other command-line utilities
KeeperFill for Apps is available in the “Settings” screen inside Keeper Desktop.
Sub-folders: Sub-folders (or folders within folders) provide greater control and organization over your private Keeper records and files. They increase organization across teams and accounts types.
Grid view layout: Grid view allows you to view your records in a graphical, tile format which displays beautiful, curated logos for popular websites. To enter Grid view, simply click on the grid icon.
Record History: Every change made to a record creates a backup version that can be viewed and restored at any time. Deleted records can also be recovered. There is no limit to the number of versions stored.
Creating Shortcuts: A record can exist outside of a folder, inside a folder or inside a shared folder. A record can also be linked into multiple folders or shared folders. A linked record is also referred to as a “shortcut”.
Keeper protects confidential files with 256-bit AES encryption using record-level keys, just like our password encryption technology. You can drag-and-drop files into your vault or take pictures & videos directly from your mobile devices.
Examples of files that might be stored in the vault include:
Financial & Banking Documents
Medical photos and videos
The growing threat of trust-based attacks is opening security risks for IT organizations who rely heavily on access to critical systems via digital certificates and keys. Keeper protects certificates and keys with 256-bit AES zero-knowledge encryption. Examples of the types of certificates that can be stored include:
RSA Key Pairs
Code Signing Certificates
Certificates and SSH keys can be stored to any Keeper vault record as either a custom field, note, or file attachment. Below is an example of a record that has two SSH keys saved as file attachments.
In addition to storing SSH keys, they can be used to securely establish connections.
Keeper Commander, a command-line SDK and toolkit for DevOps users allows you to connect to remote systems using stored credentials or SSH keys.
For more information on establishing connections using Commander, see this link.
Keeper uses RSA encryption to share passwords and files. You can share passwords or files directly with another Keeper user or with a team. Behind the scenes, information is encrypted with the recipient’s public key and decrypted with their private key.
Permissions can be assigned to individual users, or to teams of users.
View, edit and share permission sets can be applied to individual users. Shared folder permissions can provide control over the management of the folder, users and records.
Teams are created and managed in the Keeper Admin Console. Teams can also be provisioned automatically using our Active Directory Bridge software, SCIM protocols or the Keeper Commander SDK.
Since Keeper Enterprise provides a mechanism for Administrators to suspend and transfer end-user vaults, Keeper Security recommends that end-users keep business and personal vaults separate. This can be done easily using Keeper’s Account Switching features. Every platform supports the ability to easily switch between business and personal vaults.
Through the use of Keeper SSO Connect technology, end-users can seamlessly log in to their Keeper vault with any existing SAML 2.0 compatible identity provider such as Okta, Centrify, Microsoft AD FS / Azure, G-Suite, JumpCloud and F5 BIG-IP APN
Once this capability is activated by the Keeper Administrator, logging in is seamless across all device types and platforms.
Alternatively, users can first log in to identity the provider and then launch their Keeper Vault.
Keeper Enterprise provides a web-based Admin Console application. The Admin Console allows administrators to:
Onboard and offboard users
Apply role-based enforcement policies
Manage two-factor authentication
Monitor the security score of the organization
Customize end-user experience
The overall security score can be monitored by delegated Keeper administrators to ensure compliance with password policies. Detailed reports identify users who need to take corrective action. The record password strength, master password strength and two-factor authentication usage is monitored.
Keeper Admin Console provides several solutions to onboard users based on the size of the organization. Users can be provisioned through one of the following methods:
Active Directory or LDAP sync via AD Bridge
Single Sign-ON (SAML 2.0)
SCIM and Azure AD
CSV File Upload
Manual entry via the web interface
Command Line Provisioning via Keeper Commander SDK
Different organization units (nodes) can be provisioned in different ways. For example, end-users within one organizational unit can onboard via Active Directory and another group of users can be provisioned with an identity platform like Microsoft Azure or Okta.
Keeper’s role-based enforcement policies provide organizations with the most flexibility to customize their solution to meet the needs of internal controls. This includes:
Master password complexity rules
Two-Factor Authentication channels
Physical location, IP addresses and device platforms
Sharing and data export rules
Administrative permissions are also applied at the role level. Any role with administrative permission can log in to the Keeper Admin Console and perform specific job functions.
Retaining critical and confidential information is important when employees leave the organization, especially users that are in some administrative or management capacity.
Through the use of Keeper’s secure “Account Transfer” feature, a user’s vault can be locked and then transferred to another user within the organization. The process of account transfer remains fully zero-knowledge, and the responsibility of performing the account transfers can be limited based on roles within the organization. For example, only the Engineering Manager can transfer the vault of an Engineer. Or the Marketing Manager can transfer the vault of the Marketing Coordinator.
Keeper’s security model is based on the least privileged access model. Administration of groups can be delegated and restricted based on job function or any other criteria.
Account Transfers are a one-directional action. The source account is deleted and the vault records are transferred to another user account.
Keeper’s “Recent Activity” section provides event logging and forensic analysis capabilities to comply with corporate governance and audit requirements. Events are tracked throughout the system while maintaining zero-knowledge. Only privileged users with sharing or ownership rights to decrypt individual vault records are capable of viewing the stored vault information.
Advanced Reporting & Alerts Module
Keeper’s Advanced Reporting & Alerts Module (ARA Module) provides event logging and log event tracking for over 75 event types, the ability to send event based alerts and the capability to log events to an external system.
Create customized reports by specifying what criteria to filter and present in each column. Reports can now be filtered and saved based on Event types (Policy Changes, Sharing, Logins, etc), Users, and Attributes (Nodes, Devices, Location, etc).
Alerts can be triggered based upon any event criteria, such as role policy changes, privileged password access or other security events. Alerts can be sent to SMS or email and also viewed within the Admin Console interface.
ARA Module Module integrates with 3rd party Security Information and Event Management (SIEM) tools for external logging. Integrations include the following:
The ARA Module supports over 75 event types (e.g. Expired Master Password, Changed Master Password, Shared Record, Disabled Two-Factor Authentication etc. ) that can be automatically pushed to popular SIEM products such as Splunk, Sumo and QRadar.