KeeperPAM is a Privileged Access Management (PAM) solution that grows as you do. - Scalable cloud-native architecture: KeeperPAM is a cloud-based system that can grow easily with your organization for each user, device and system - Centralized access management across hybrid environments: KeeperPAM ensures you can manage your systems in the cloud, on-prem or in a hybrid environment - Auditing, monitoring and compliance features: KeeperPAM ensures that privileged accounts are monitored so every user acts appropriately with sensitive information and your organization remains compliant with security regulations Learn more about why KeeperPAM is the best solution for your organization’s security needs: https://lnkd.in/eYxA6XSY #dontgethacked #keeper
Keeper Security, Inc.
Software Development
Chicago, Illinois 107,114 followers
Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security
About us
Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security
- Website
-
https://keepersecurity.com/
External link for Keeper Security, Inc.
- Industry
- Software Development
- Company size
- 201-500 employees
- Headquarters
- Chicago, Illinois
- Type
- Privately Held
- Founded
- 2011
- Specialties
- Password Management, Secure File Storage, Cyber Security, password security, cybersecurity, password vault, SSO, zero knowledge, secrets management, and remote access
Products
Keeper Password Security Platform
Password Management Software
Millions of people and thousands of businesses depend on Keeper's password security and management platform to substantially reduce the risk of a data breach. Keeper is the world leader for securing passwords, documents, and sensitive digital assets. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Start a 14-Day Free Trial now.
Locations
-
Primary
333 North Green St.
Suite 811
Chicago, Illinois 60607, US
-
King's Terrace
5A Lower Glanmire Rd.
Victorian Quarter, Cork T23 DX49, IE
-
Prime Terrace KAMIYACHO, 4th Floor
4-1-13 Toranomon
Minato-ku, Tokyo 105-0001 , JP
Employees at Keeper Security, Inc.
-
Paul A. Aronhime
Growth Executive aligning strategy, technical innovation, operations and business execution in highly complex federal environments.
-
Padraigh Conway
-
Jeffrey Martin
-
Arindam Sinha
Data Architect/Principal Data Engineer/Senior Technical Manager, Data Management - Cloud, Data Warehouse/Marts, Data Lake, ETL, Data Pipelines
Updates
-
Hardware security keys add an extra layer of defense against #cybersecurity threats. 💪 Stronger Security: Prevents cybercriminals from stealing your credentials on spoofed websites. Even if they know your username and password, registering a hardware security key ensures they cannot access your account without this form of MFA 🛡️ Protects Against Various Types of Attacks: Phishing, Man-in-the-Middle (MITM), account takeover and SIM swapping 🔑 Seamless Login Experience: Simply insert or tap your security key and you can log in without needing to complete several verification steps 🔒 Improved Privacy: Hardware security keys don’t send a code or text to verify your identity, meaning there is less chance your data will be intercepted by cybercriminals 🔎 Secures Your Account if Your Device is Lost or Stolen: Having a hardware security key registered to your accounts will secure them because anyone who finds your device would also need your physical key to authenticate Read the blog post below to learn how hardware security keys compare to other authentication methods. https://lnkd.in/eMAqSwkY
Benefits of Using Hardware Security Keys on iOS
keepersecurity.com
-
A Privileged Access Management (PAM) Solution incorporating zero-knowledge security, granular access controls, session management and automated password rotation is all you need for complete organization protection. KeeperPAM offers: ☁️ A cloud-based, zero-trust and zero-knowledge platform, which means Keeper never has access to your data, systems or sessions 💻 Role-Based Access Control (RBAC) and Just-in-Time (JIT) access, defining which roles are allowed specific privileges and how long authorized users can access specific data 📊 Remote Browser Isolation (RBI), which enables you to monitor and record browser isolation sessions for auditing and compliance Learn more about KeeperPAM: https://lnkd.in/e3-grEQG #dontgethacked #keeper #cybersecurity
Do You Need More Than One PAM Solution?
keepersecurity.com
-
This past year has been full of innovation, collaboration and amazing moments that would not have been possible without our incredible team. We want to send a special thank you to all of our employees for being part of this amazing journey. 2025 here we come! #KeeperRacing #WeAreWilliams #KeeperSecurity
-
2024 has been a transformative year for Keeper Security! 💻 Rolled out Remote Browser Isolation, Risk Management Dashboard and a refreshed UX alongside enhanced features like Time Limited Access and Self Destructing Records 🤝 Launched an official partnership with storied Formula 1 team Williams Racing 🏆 Received multiple accolades and awards including Best Security Company and Value Leader for KeeperPAM in the 2024 EMA PAM Radar Report 📚 Unveiled Flex Your Cyber, an educational initiative to empower students, parents, teachers and administrators around the globe with essential cybersecurity knowledge …and more 2025, here we come! https://lnkd.in/egpJNFtT
2024 Keeper Security Retrospective
https://www.youtube.com/
-
ZimperiumLabs reports that a recent mobile phishing (mishing) campaign disguised as DocuSign sought to steal corporate credentials from top executives. Keeper VP of Security & Compliance Patrick Tiquet, and other #cybersecurity leaders, share insights organizations can leverage to safeguard against threats targeting their employees through mobile devices. - Implement mobile device management policies and ensure that both corporate-issued and BYOD devices comply with security standards - Enforce Multi-Factor Authentication (MFA) to add another layer of protection - Provide regular employee training and simulate phishing exercises to help reinforce secure behaviors Read the full article: https://lnkd.in/eKpiAnhB #dontgethacked #keeper
Fake DocuSign docs used to secure corporate credentials in mishing campaign
scworld.com
-
📰 This month’s edition of Inside the Vault is live! Dive into the latest Keeper Security news, updates and highlights. #dontgethacked #keeper
December 2024
Keeper Security, Inc. on LinkedIn
-
Empowering students in the digital world goes beyond the classroom walls. Proactive steps must be taken to enhance #cybersecurity education, raise risk awareness and embrace secure tools like password managers. Together, we can create a safe digital space for students, parents, teachers and administrators. Unpack key findings and details on cybersecurity gaps within schools globally in our Cybersecurity in Schools report: https://lnkd.in/euJ4-i8y
-
Keeper Security Governance, Risk and Compliance Analyst Teresa Rothaar, and other industry experts, unpack five #cybersecurity trends to be aware of as we head into the New Year. - A gap in talent and other hiring related issues - The pros and cons of #AI for security - Reimaging the role of Chief Information Security Officers - A growing understanding by organizations to invest in defensive infrastructure - An increased demand for specialized OT security expertise Read the full article in Dice: https://lnkd.in/esJSPGgr
5 Cybersecurity Trends for 2025 That Tech Pros Need to Know
dice.com
-
The recent cyber attack on doughnut chain Krispy Kreme is a reminder of how critical it is for organizations of all sizes to prioritize their security. Keeper CISO James Scobey highlights the significant impact that #cybersecurity disruptions can have on organizations and shares proactive steps they can take to stay protected. - Ensure essential personnel have access and continuously monitor privileged accounts for unusual activity - Use a password manager to create strong, unique passwords and leverage multi-factor authentication - Conduct regular audits and implement employee education on cybersecurity best practices Read the full article in SecureWorld: https://lnkd.in/eQFD5DiC #dontgethacked #keeper
Sweet Treats, Sour Breach: Cyberattack Hits Krispy Kreme
secureworld.io