Keeper Security
keepersecurity.comBuild Difficulty: 4/5
A few focused days to build a solid replacement
Password Management and Privileged Access Management (PAM) Solution
How to Replace Keeper SecurityOverview
Features
82 features across 13 categories
Administration(9)
Securely transfer a departing employee's vault to another user during offboarding.
Manage users, roles, vault policies and security settings from a single, centralized dashboard.
Mirror your company's hierarchy with nested nodes for flexible policy enforcement and visibility.
Automate user, role and team management with Keeper Commander, our secure CLI toolkit.
Assign admin responsibilities to specific roles or teams without granting full access.
Enforce strong password requirements to meet compliance standards and reduce risk.
Apply custom permissions by role to enforce security policies and limit user capabilities.
Automate user and team provisioning from identity platforms with SCIM 2.0 compatibility.
Group users by department or function to simplify access control and record sharing.
Audit(6)
Build custom reports and real-time alerts for security events, role changes and vault activity.
Instantly audit who has access to what, with downloadable reports that support SOX, HIPAA, ISO 27001 and more.
Identify unmanaged credentials and privileged accounts across your infrastructure with automated asset discovery.
Get a real-time view of vault security, policy enforcement and user behavior across your organization.
Continuously monitor password strength, reuse and risk across users, teams and shared records.
Stream Keeper logs into your SIEM to centralize visibility and accelerate incident response.
Authentication(12)
Automatically sync users and groups from Active Directory to simplify deployment and user management.
Log in instantly using face or fingerprint recognition, no need to enter your master password.
Quickly unlock Keeper with built-in biometric authentication on your trusted devices.
Control which devices can access your Keeper Vault to prevent unauthorized logins.
Integrate with Microsoft Entra ID (formerly Azure AD) to manage users and enforce enterprise policies.
Approve new devices or login attempts with a simple push notification.
Connect Keeper to your LDAP directory for centralized authentication and provisioning.
Store, use and share passkeys for passwordless login across devices.
Seamlessly integrate Keeper with your Identity Provider (IdP).
Generate time-based codes directly inside the Keeper Vault.
Require an additional factor to access the vault.
Access records and approve logins on your smartwatch for speed and convenience.
Automation(4)
Leverage AI-powered insights to identify security gaps, automate responses and strengthen least privilege enforcement.
Self-host Keeper's Multi-Cloud Proxy server to control routing, enforce data residency and streamline PAM deployments.
Automate rotation rules by user, system or schedule to enforce security best practices at scale.
Identify suspicious behavior across vaults with intelligent monitoring for risky access patterns.
Browser Extension(5)
Quickly and securely fill passwords, passkeys and 2FA codes across apps and websites.
Experience secure, instant logins with a zero-knowledge browser extension for passwords, passkeys and autofill.
Keeper detects when you're changing a password and prompts you to update your vault with the new one.
Create strong, unique passwords or passphrases with customizable complexity in one click.
Capture and export real-time views of user permissions and vault access for audits or internal reviews.
Compliance(2)
Keeper is FedRAMP High Authorized, meeting rigorous U.S. government security and compliance standards for cloud services.
Built for the public sector, Keeper GovCloud is GovRamp Authorized to protect sensitive federal, state and local data.
Developer(8)
Protect your DevOps pipeline by securely delivering secrets into build systems and deployment workflows.
Manage vault records, users and shared folders directly from the command line.
Integrate Keeper into your stack with RESTful APIs for vault management, provisioning and audit logging.
Access a full suite of tools for building secure, automated workflows with Keeper's platform.
Automate provisioning, vault operations and security policies with Keeper's open-source CLI tool.
Easily manage access to secrets across teams by sharing entire applications in Keeper Secrets Manager.
Securely inject secrets into your applications using CLI tools and SDKs for Python, Go, .NET and more.
Load SSH keys from your Keeper vault and establish secure sessions without exposing private keys.
Encryption(2)
Next-generation encryption built to protect your data against future quantum threats.
Only you can access your data. Keeper can't see or decrypt your vault.
Mobile Apps(2)
Manage passwords, generate passkeys and stay protected on the go with Keeper for Android.
Access your vault, autofill passwords and approve logins securely from your iPhone or iPad.
Privileged Access(16)
Access infrastructure using native protocols, no agents, VPNs or firewall changes required.
Continuously rotate credentials across servers, databases and services to minimize your attack surface.
Securely launch and monitor privileged sessions across infrastructure without exposing credentials.
Standardize and scale access with reusable templates for common SSH, RDP, and database configurations.
Create temporary privileged accounts that are automatically deleted after use.
Connect to systems with elevated privileges using role-based, just-in-time credentials.
Instantly connect to servers, desktops and remote systems through your browser or desktop app.
Enforce access controls that limit users to only the systems and credentials they need.
Open internal web apps in a hardened, isolated browser environment to prevent data exfiltration and malware.
Enable secure remote access to infrastructure and applications across hybrid and multi-cloud environments.
Record and audit privileged sessions with searchable video and keystroke playback across protocols.
Eliminate key sprawl by storing, rotating and assigning SSH keys from a centralized, encrypted vault.
Create secure tunnels for local development tools and database clients without exposing your network.
Enforce expiration windows for privileged access; credentials expire automatically after a set duration.
Grant secure, limited access to third-party vendors without creating permanent accounts.
Remove standing access to critical systems. Grant access dynamically and only when needed.
Sharing(5)
Send a time-limited, self-expiring record to anyone, even if they don't use Keeper.
Safely share credentials, secrets and files with other Keeper users using zero-knowledge encryption.
Protect sensitive data with records that automatically delete after a set number of views or days.
Designate admins to manage shared folders, control access and enforce permissions across teams.
Organize and distribute records to teams with granular control over edit, share and ownership permissions.
Threat Detection(5)
Continuously monitor the dark web for exposed credentials and alert users to take immediate action.
Enrich threat intelligence by connecting Keeper with CrowdStrike for extended detection and response (XDR).
Receive real-time notifications when Keeper detects compromised passwords linked to your accounts.
Detect and block credential theft in real time with endpoint-level protection powered by Keeper.
Push Keeper audit logs to Google Chronicle for scalable threat analysis and correlation.
Vault(6)
Create tailored record types to match your organization's unique use cases and data fields.
Store and manage passwords, secrets and files in a fully encrypted, zero-knowledge vault.
Securely upload and store sensitive files, photos and documents with full end-to-end encryption.
Access your vault even without an internet connection; encrypted data stays on your device.
Keep your information secure in public with a screen blur that activates after inactivity.
Use purpose-built templates for logins, payment cards, SSH keys, database credentials and more.
Pricing
Business Starter
- ✓Password Manager
- ✓5 to 10 seats minimum
- ✓Unlimited devices
- ✓Encrypted vault
- ✓Password Sharing
- ✓Folders and subfolders
- ✓Password and passphrase generator
- ✓Free Family Plan for every user
- ✓Admin Console
- ✓Policy engine and enforcements
- ✓Team management
- ✓Basic two-factor authentication
- ✓Zero-knowledge encryption
- ✓SOC II Type 2 Certified
- ✓ISO 27001, 27017 and 27018 Certified
Business
- ✓Password Manager
- ✓Minimum 5 seats
- ✓Unlimited devices
- ✓Encrypted vault
- ✓Password Sharing
- ✓Folders and subfolders
- ✓Shared team folders
- ✓Password and passphrase generator
- ✓Free Family Plan for every user
- ✓Admin Console
- ✓Policy engine and enforcements
- ✓Team management
- ✓Basic two-factor authentication
- ✓Delegated administration
- ✓Advanced Organizational Structure
- ✓SCIM Provisioning
- ✓Command line provisioning
- ✓Share admin
- ✓Automated team management
- ✓Active Directory and LDAP sync
- ✓Entra ID (Azure) integration
- ✓Advanced two-factor authentication (DUO & RSA)
- ✓Single Sign-On (SAML 2.0) authentication
- ✓Developer APIs
- ✓Secrets management
- ✓Automated password rotation
- ✓Zero-knowledge encryption
- ✓SOC II Type 2 Certified
- ✓ISO 27001, 27017 and 27018 Certified
Enterprise
- ✓Password Manager
- ✓Minimum 5 seats
- ✓Unlimited devices
- ✓Encrypted vault
- ✓Password Sharing
- ✓Folders and subfolders
- ✓Shared team folders
- ✓Password and passphrase generator
- ✓Free Family Plan for every user
- ✓Admin Console
- ✓Policy engine and enforcements
- ✓Team management
- ✓Basic two-factor authentication
- ✓Delegated administration
- ✓Advanced Organizational Structure
- ✓SCIM Provisioning
- ✓Command line provisioning
- ✓Share admin
- ✓Automated team management
- ✓Active Directory and LDAP sync
- ✓Entra ID (Azure) integration
- ✓Advanced two-factor authentication (DUO & RSA)
- ✓Single Sign-On (SAML 2.0) authentication
- ✓Developer APIs
- ✓Secrets management
- ✓Automated password rotation
- ✓Secrets manager CLI and SDKs
- ✓CI/CD integrations
- ✓Remote access Connection Management
- ✓Session recording and playback
- ✓TCP Tunneling for native tools
- ✓Remote browser isolation to protect web apps
- ✓Vendor privileged access management
- ✓Endpoint privilege management
- ✓Just-in-Time (JIT) access and elevation requests with approval workflow
- ✓Agents for Windows, macOS and Linux devices
- ✓Risk Management Dashboard
- ✓Security Audit
- ✓Activity reporting
- ✓KeeperAI
- ✓Advanced Reporting & Alerts (ARAM)
- ✓Compliance Reports
- ✓SIEM integration
- ✓Zero-knowledge encryption
- ✓SOC II Type 2 Certified
- ✓ISO 27001, 27017 and 27018 Certified
- ✓FedRAMP and GovRAMP Authorized
Privileged Access Manager (PAM)
- ✓Credential management
- ✓Minimum 5 seats
- ✓Unlimited devices
- ✓Encrypted vault
- ✓Connection Management
- ✓Session recording and playback
- ✓TCP Tunneling for native tools
- ✓Remote browser isolation to protect web apps
- ✓Vendor privileged access management
- ✓Endpoint privilege management
- ✓Just-in-Time (JIT) access and elevation requests with approval workflow
- ✓Agents for Windows, macOS and Linux devices
- ✓Risk Management Dashboard
- ✓Security Audit
- ✓Activity reporting
- ✓KeeperAI
- ✓Advanced Reporting & Alerts (ARAM)
- ✓Compliance Reports
- ✓SIEM integration
- ✓Zero-knowledge encryption
- ✓SOC II Type 2 Certified
- ✓ISO 27001, 27017 and 27018 Certified
- ✓FedRAMP and GovRAMP Authorized
Cost Calculator
Pricing data not available for Keeper Security. Check their website for current pricing.
Build vs Buy
Should you build a Keeper Security alternative or buy the subscription? Estimate based on 82 features.
Buy Keeper Security
Better ValueBuild Your Own
Buying Keeper Security saves ~$110,880 over 3 years vs building.
Estimates based on 82 features and a BuildScore of 4/5. Actual costs vary.
Integrations
13 known integrations