SecureSafe

Last updated
SecureSafe
Developer(s) DSwiss AG
Initial release2008
Operating system Windows, macOS, Android, iOS, Web [1]
Type Password manager, secrets manager, Online backup service
License Software as a Service (SaaS)
Website securesafe.com

SecureSafe is a cloud based software-as-a-service with a password safe, a document storage and digital spaces for online collaboration. The service is developed based on the principles of security by design and privacy by design. [2]

Contents

Data centers

SecureSafe stores customers’ data in three data centers using triple redundancy mirroring. The first data center is dedicated to production, the second is a hot standby [3] and the third acts as the so-called disaster recovery center. The first two data centers are located in the greater area of Zürich at the company Interxion. [4] The third center is located in a former military bunker in the mountains of central Switzerland. [5]

Features

Password manager

A password manager is used to store passwords. The passwords that are stored in SecureSafe are protected by AES-256 and RSA-2048 encryption. [6]

File storage

A file storage or cloud storage is used to store files online.

2-factor authentication

The login method 2-factor authentication is also known from e-banking systems. [7] It works by sending a one-time code to a user’s mobile every time he or she logs into a given online account. Even if a hacker should get to the user’s login data, the information is useless without the additional security code. [2]

Data rooms

Data rooms are digital spaces where groups of people can share data online. [8]

Data inheritance

Data inheritance or digital inheritance enables customers to pass on important digital assets to others. Among the digital assets people pass on is login criteria to online accounts, insurance and legal documents and photo collections. [8] [9] [10]

Related Research Articles

<span class="mw-page-title-main">Password</span> Text used for user authentication to prove identity

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.

<span class="mw-page-title-main">Secure cryptoprocessor</span> Device used for encryption

A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.

<span class="mw-page-title-main">Online banking</span> Internet-based financial transactions

Online banking, also known as internet banking, virtual banking, web banking or home banking, is a system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website or mobile app. Since the early 2000s this has become the most common way that customers access their bank accounts.

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

<span class="mw-page-title-main">One-time password</span> Password that can only be used once

A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

<span class="mw-page-title-main">Security token</span> Device used to access electronically restricted resource

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing transactions such as wire transfers.

3-D Secure is a protocol designed to be an additional security layer for online credit and debit card transactions. The name refers to the "three domains" which interact using the protocol: the merchant/acquirer domain, the issuer domain, and the interoperability domain.

A password manager is a computer program that allows users to store and manage their passwords for local applications or online services such as web applications, online shops or social media. A web browser generally has a built in version of a password manager. These have been criticised frequently as many have stored the passwords in plaintext, allowing hacking attempts.

There are several forms of software used to help users or organizations better manage passwords:

Password fatigue is the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine, such as to log in to a computer at work, undo a bicycle lock or conduct banking from an automated teller machine. The concept is also known as password chaos, or more broadly as identity chaos.

Digital inheritance is the passing down of digital assets to designated beneficiaries after a person’s death as part of the estate of the deceased. The process includes understanding what digital assets exist and navigating the rights for heirs to access and use those digital assets after a person has died.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

Apple Account, formerly known as Apple ID, is a user account by Apple for their devices and software. Apple Accounts contain the user's personal data and settings. When an Apple Account is used to log in to an Apple device, the device will automatically use the data and settings associated with the Apple Account.

iCloud Cloud storage and cloud computing service by Apple

iCloud is a cloud service operated by Apple Inc. Launched on October 12, 2011, iCloud enables users to store and sync data across devices, including Apple Mail, Apple Calendar, Apple Photos, Apple Notes, contacts, settings, backups, and files, to collaborate with other users, and track assets through Find My. It is built into iOS, iPadOS, watchOS, tvOS, macOS, and visionOS. iCloud may additionally be accessed through a limited web interface and Windows application.

Tresorit is a cloud storage platform that offers functions for administration, storage, synchronization, and transfer of data using end-to-end encryption. More than 13,000 companies use Tresorit to protect confidential data and share information securely. It is also used widely by Government organizations and NGOs as well as privacy-conscious individuals to protect sensitive data from unauthorized access and data-breaches.

In cryptography, the Salted Challenge Response Authentication Mechanism (SCRAM) is a family of modern, password-based challenge–response authentication mechanisms providing authentication of a user to a server. As it is specified for Simple Authentication and Security Layer (SASL), it can be used for password-based logins to services like LDAP, HTTP, SMTP, POP3, IMAP and JMAP (e-mail), XMPP (chat), or MongoDB and PostgreSQL (databases). For XMPP, supporting it is mandatory.

Biometric tokenization is the process of substituting a stored biometric template with a non-sensitive equivalent, called a token, that lacks extrinsic or exploitable meaning or value. The process combines the biometrics with public-key cryptography to enable the use of a stored biometric template for secure or strong authentication to applications or other systems without presenting the template in its original, replicable form.

Intuitive Password is a proprietary freemium password manager and secure digital wallet that stores users' passwords and confidential data. It was launched in 2013 by the Australian company Intuitive Security Systems. Intuitive Password received mixed reviews. Neil J. Rubeking wrote in PC Magazine in 2013 that one significant downside of Intuitive Password's was their lack of automated password capture, like some of their competitors.

<span class="mw-page-title-main">Bitwarden</span> Open-source password manager


Bitwarden is a freemium open-source password management service that stores sensitive information, such as website credentials, in an encrypted vault. The platform offers a variety of client applications, including a web interface, desktop applications, browser extensions, mobile apps, and a command-line interface. Bitwarden offers a free US or European cloud-hosted service as well as the ability to self-host.

NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single encrypted password vault. It offers both free and premium versions, although the free version lacks much of the paid functionality like multi-device login. NordPass, which is based in the United States was developed by the same cybersecurity team that created NordVPN, a VPN service provider.

References

  1. SecureSafe. "Downloads" . Retrieved 7 July 2024.
  2. 1 2 "Archived copy" (PDF). Archived from the original (PDF) on 2016-04-10. Retrieved 2015-04-24.{{cite web}}: CS1 maint: archived copy as title (link)
  3. hot standby
  4. "Homepage". interxion.com. 29 November 2019.
  5. "Deltalis". Deltalis.ch. Retrieved 2014-08-26.
  6. "SecureSafe: Bank Level Security on Your iPad « iPad.AppStorm". Ipad.appstorm.net. 2012-04-11. Retrieved 2014-08-26.
  7. Acharya, Sagar (1970-01-01). "Internet Banking Two Factor Authentication Using Smartphone | Sagar Acharya". Academia.edu. Retrieved 2014-08-26.
  8. 1 2 ""SecureSafe for Teams" Enables Secure Exchange of Data Within a Team (21. November 2012, 09:30 Uhr)". Wallstreet-online.de. 2012-11-21. Retrieved 2014-08-26.
  9. "Digital Inheritance". De.scribd.com. 2009-06-25. Retrieved 2014-08-26.
  10. Eisenberg, Anne (25 May 2013). "Bequeathing the Keys to Your Digital Afterlife". The New York Times.