This article needs additional citations for verification .(October 2022) |
The list below includes the names of password managers with dedicated Wikipedia articles.
Provider | Cost | Import from browsers | Import from competitors | Multi-factor authentication | Export data | Automatic password capture | Automatic password replay | Forms | Multiple form-filling identities | Actionable password strength report | Secure sharing | Digital legacy | Portable edition | Application passwords | Browser menu of logins | Application-level encryption | Secure password sharing |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1Password | $3–5 (monthly) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Bitwarden | No cost or $10 (yearly) | Yes | Yes | Yes, 2FA protection on account is free. 2FA generation is a premium feature. [2] | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Dashlane | No cost or $4–6 (monthly) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Enpass | No cost or $12 (yearly) | No | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
GNOME Keyring | No cost | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? |
Intuitive Password | No cost or $2 (monthly) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Depends | Yes | Yes | Yes | Yes | Yes |
KeePass | No cost | Yes | Yes | Yes (plugin) | Yes | Yes | Yes | Yes | Yes | Yes | Optional (requires add-on server) | Depends | Yes | Yes | Yes | Yes | ? |
KeePassXC, KeePassDX | No cost | Yes | Yes | Yes (built-in) | Yes | Yes | Yes | Yes | Yes | Yes | No | Depends (external key share) | Yes | Yes | Yes | Yes | No |
Keeper | No cost or $30 (yearly) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
KeeWeb | No cost | No | Yes | No | Yes | Yes | Yes | Yes | Yes | No | Yes | Depends | Yes | Yes | Yes | Yes | ? |
KWallet | No cost | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? |
LastPass | No cost or $36 (yearly) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Microsoft Autofill | No cost | ? | Yes | Yes | Yes | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? |
Myki (discontinued by April 10, 2022 [1] ) | No cost | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Depends | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes [3] |
NordPass | No cost or $5 (monthly) or $36 (yearly) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes | Yes | Yes |
Norton Password Manager | No cost | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes (iOS – US only) | Yes | Yes | Yes | ? |
pass | No cost | Yes (third-party) | Yes (third-party) | Yes | Yes | Yes (third-party) | Yes (third-party) | Yes (third-party) | Yes | Yes (third-party) | Yes | Depends | Yes | Yes | Yes (third-party) | Yes | ? |
Pleasant Password Server | No cost or $10 (monthly) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ? |
RoboForm | No cost or $23.88 (yearly) | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? |
SafeInCloud | No cost or $4.99 (mobile, individual) or $9.99 (mobile, family sharing) | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? |
SecureSafe | No cost or $39.95 | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? | ? |
Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.
RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource.
CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC2.
Xcitium, formerly known as Comodo Security Solutions, Inc., is a cybersecurity company headquartered in Bloomfield, New Jersey.
Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.
A password manager is a computer program that allows users to store and manage their passwords for local applications or online services such as web applications, online shops or social media. A web browser generally has a built in version of a password manager. These have been criticised frequently as many have stored the passwords in plaintext, allowing hacking attempts.
Myki, stylised as myki, is a reloadable credit card-sized contactless smart card ticketing system used for electronic payment of fares on most public transport services in Melbourne and regional Victoria, Australia. Myki replaced the Metcard ticketing system and became fully operational at the end of 2012.
KDE Wallet Manager (KWallet) is free and open-source password management software written in C++ for UNIX-style operating systems. KDE Wallet Manager runs on a Linux-based OS and Its main feature is storing encrypted passwords in KDE Wallets. The main feature of KDE wallet manager (KWallet) is to collect user's credentials such as passwords or IDs and encrypt them through Blowfish symmetric block cipher algorithm or GNU Privacy Guard encryption.
LastPass is a password manager application owned by GoTo. The standard version of LastPass comes with a web interface, but also includes plugins for various web browsers and apps for many smartphones. It also includes support for bookmarklets.
Nexor Limited is a privately held company based in Nottingham, providing products and services to safeguard government, defence and critical national infrastructure computer systems. It was originally known as X-Tel Services Limited.
Cyber Essentials is a United Kingdom certification scheme designed to show an organisation has a minimum level of protection in cyber security through annual assessments to maintain certification.
PT Tokopedia is an Indonesian e-commerce company. Tokopedia is a subsidiary of a new holding company called GoTo, following a merger with Gojek on 17 May 2021. It is one of the most visited e-commerce platforms in Indonesia.
Self-hosting is the practice of running and maintaining a website or service using a private web server, instead of using a service outside of someone's own control. Self-hosting allows users to have more control over their data, privacy, and computing infrastructure, as well as potentially saving costs and improving skills.
Myki was a password manager and authenticator developed by Myki Security. Myki was available on iOS and Android, as browser extensions on Chrome, Firefox, Safari, Opera and Microsoft Edge, and as a standalone desktop app for Windows, macOS, Linux, Arch Linux, and Debian. It was available in English, Arabic, French, German, Italian, Portuguese and Spanish. On 24 March 2022, MYKI announced Jump Cloud's acquisition of Myki and on 10 April 2022, Myki ceased to operate.
Bitwarden is a freemium open-source password management service that stores sensitive information, such as website credentials, in an encrypted vault. The platform offers a variety of client applications, including a web interface, desktop applications, browser extensions, mobile apps, and a command-line interface. Bitwarden offers a free US or European cloud-hosted service as well as the ability to self-host.
Myki is the ticketing system for public transport in Victoria, Australia.
This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.
Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.
The following is a general comparison of OTP applications that are used to generate one-time passwords for two-factor authentication (2FA) systems using the time-based one-time password (TOTP) or the HMAC-based one-time password (HOTP) algorithms.