Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Introducing Landscape Mode, Passphrases and Other Improvements to KeeperFill

Introducing Landscape Mode, Passphrases and Other Improvements to KeeperFill Intro KeeperFill is Keeper’s powerful, autofilling feature that works across all devices, allowing you to automatically and securely fill your usernames, passwords, passkeys, 2FA codes and more into the sites you visit.

The Three Different Types of Hackers

There are three general categories that hackers fall into: white hat hackers, black hat hackers and gray hat hackers. Each type of hacker has different motivations behind their hacking activities. Learn more about the different types of hackers and how to prevent malicious hackers from compromising your online accounts.

Keeper 101 | Enterprise: Risk Management Dashboard

The Keeper Risk Management Dashboard is a powerful feature of the Keeper Admin Console that provides comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring. This critical data helps administrators ensure that risks are remediated and compliance is enforced effectively. The Risk Management Dashboard monitors key metrics and leverages Keeper Security's Benchmarks to enforce the highest level of security in your environment across all users and devices.

Keeper 101 | Enterprise: How to Use Keeper Commander CLI

Keeper Commander allows you to perform administrative and vault functions from a command line environment on Mac, Windows and Linux. You can start Commander by typing “keeper shell” in a terminal window. Enter your username, password, and complete any 2FA requirements when prompted. If you are logging in for the first time on a new device, you may be prompted for device approval for additional security. More information about login methods, such as SSO, can be found in our documentation.

Keeper 101 | Enterprise - Keeper Connection Manager With Remote Browser Isolation On-premise

Keeper Connection Manager, is a Zero-Knowledge and Zero-Trust platform that provides instant, secure and effortless access to your infrastructure and desktops from any device. Keeper Connection Manager is an agentless remote desktop gateway that can be installed in any on-premise or cloud environment. Keeper Connection Manager was built by the original creators of Apache Guacamole, a widely used open source remote access gateway with millions of installs. Guacamole's proven technology and active development community provides customers with a high level of trust.

Keeper 101 | Enterprise - How Keeper's Advanced Reporting & Alerts Module Works

Learn how Keeper's Advanced Reporting & Alerts Module works within Keeper Enterprise. This module provides insight to assess vulnerabilities related to administrative changes, password reuse, unauthorized access, password stuffing attacks and insider threats.. The “Reporting Dashboard” provides a quick view of top events, the “Recent Activity” and "All Security Events” reports and any saved custom reports. Monitoring these events can assist in the detection of several threat vectors and help establish enforcement policies around vault and privileged account access.

KeeperMSP

KeeperMSP is the most secure, cybersecurity and password management platform for preventing password-related data breaches and cyberthreats. Designed exclusively for Managed Service Providers, KeeperMSP provides a powerful, easy-to-use platform to protect you and your customers’ passwords and sensitive data in secure, encrypted vaults. Web Vault Keeper’s Web Vault is where each provisioned user will securely store and access their passwords, credentials, files and any private data.

Breaking Barriers: Demystifying Zero Trust with Chase Cunningham & Keeper Security

Zero trust is a powerful cybersecurity approach, but its implementation remains a challenge for many organizations. In this webinar, renowned expert Chase Cunningham demystifies the concept of zero trust and provides practical strategies to overcome the barriers to its adoption. Cunningham explores the core principles of zero trust, dispelling common misconceptions and highlighting its benefits in protecting against modern cyber threats. Drawing from real-world experiences, he'll guide you through the process of implementing robust zero-trust architectures tailored to your organization's needs.