

KSI cannot remotely access a customer's device nor can it decrypt the customer's vault. KSI does not have access to a customer's master password nor does KSI have access to the records stored within the Keeper vault. KSI cannot decrypt the user's stored data. The encryption key that is needed to decrypt the data always resides with the Keeper user. This multi-tiered encryption model provides the most advanced data protection available in the industry. Secure record syncing between the user's devices is also encrypted at the network layer and routed through Keeper's Cloud Security Vault.

Data stored at rest on the user's device is also encrypted by another 256-bit AES key, called the Client Key. The Data Key is encrypted by a key derived on the device from the user's Master Password. The record keys are protected by an additional key, called the Data Key. Each individual record stored in the user's vault is encrypted with a random 256-bit AES key that is generated on the user's device. With Keeper, encryption and decryption occurs only on the user's device upon logging into the vault. The Keeper user is the only person that has full control over the encryption and decryption of their data. KSI is a Zero-Knowledge security provider. Strengthen your organization with zero-trust security and policiesĪchieve industry compliance and audit reporting including SOX and FedRAMPĪutomate credential rotation to drastically reduce the risk of credential-based attacks Restrict secure access to authorized users with RBAC and policies Initiate secure remote access with RDP, SSH and other common protocols Manage and protect SSH keys and digital certificates across your tech stack Privileged Session ManagementSecurely manage applications and services for users, teams and nodes.Protect critical infrastructure, CI/CD pipelines and eliminate secret sprawlĪchieve visibility, control and security across the entire organization Password SharingSecurely share passwords and sensitive information with users and teamsĮnable passwordless authentication for fast, secure access to applications.Seamlessly and quickly strengthen SAML-compliant IdPs, AD and LDAP Protect and manage your organization's passwords, metadata and files
