Keeper password manager doesn’t disappoint you, almost nowhere.
It’s simple yet powerful. User-friendly but secure.
A good password manager, but indeed, not the most economic.
Let’s jump into the details and discover what Keeper offers its users for the cash it bills.
Keeper Password Manager and Vault
Keeper Security Inc. was founded by Darren Guccione and Craig Lurey in 2009. It is headquartered in Chicago, IL; other official locations include El Dorado Hills, CA and Cork, Ireland.
Keeper Password Manager covers all the major desktop and mobile platforms: Mac, Windows, Linux, Android, iOS.
KeeperFill, its browser extension, is available for all leading browsers: Chrome, Firefox, Safari, IE, Edge, Opera.
The sole reason for any user to trust a password manager is security.
And after reading through their website, one seldom goes unconvinced.
Keeper practices a zero-knowledge policy. So, only a user has a record of its own master password.
Also, encryption-decryption takes place on the user’s device, and not on the Keeper’s servers.
Encryption and similar algorithms use an AES-256 bit key, which is generated and kept with the user’s device.
Again, the cipher key used for encryption and decryption is stored locally and not on the Keeper’s cloud, except for sync.
For syncing across devices and platforms, an encrypted version of the cipher key is stored in the cloud.
Overall, Keeper promises multilevel encryption and to store nothing about the user besides the email address, device type, and subscription plan.
Keeper has TOTPs (Time-based One Time Passwords) for securing the password vault in addition to the master password.
In this case, when a user logs in using the master password, they get a secret key which is entered additionally to access the vault.
The key can be obtained via SMS, Duo Security, RSA SecurID, Google or Microsoft Authenticator, or Keeper DNA-compatible wearable devices (Apple Watch or Android Wear).
FIDO (U2F) Security Keys
These physical keys are an alternative to two-factor authentication.
A FIDO-compatible U2F hardware-based security key (like YubiKey) can be registered in the settings menu.
So, the next time you log in, insert it in a USB port in addition to the master password to unlock the vault.
Some keys also have NFC depending upon the model.
One can share the vault with the emergency contacts (up to 5).
The vault will be accessible by the emergency contact after a fixed time set by the original user.
Besides this, the recipient must be a Keeper user with a public/private key pair to access the vault.
The key pair is used for local encryption/decryption of the vault at the emergency contact’s device.
Hands-On: Keeper Password Manager
You need an email and a master password to create an account.
It will then ask to verify your email id by entering the code already sent to it. Fill that code and you’re in.
Like all password managers, it has options for import.
Import function for almost every password manager has these common steps of exporting ‘.csv’ file from the old one and then importing the same in the new.
For simplicity, there are dedicated instructions for a large number of password managers.
Even if the list is missing any particular password manager–one can follow the normal process mentioned above.
Similar to import–there is an export tab. In case you wish to migrate to another password manager or keeping a copy for backup.
Apart from the passwords, Keeper can save your credit card particulars as well.
This feature may come in handy if you’re an avid online shopper: no need to enter the payment details every time you pay online.
This one lets you assess password vault strength, overall and separately for each entry. You can identify weak passwords and replace them if need be.
BreachWatch and more...
BreachWatch is a fancy feature that monitors Dark Web for any potential leak matching your vault contents.
And it does so while keeping its Zero-Knowledge policy intact, which is amazing, if true.
Keeper tries hard to persuade its customers that using BreachWatch is safe, and the process doesn’t jeopardize the security of the vault.
But if you’ve any apprehensions regarding this, just don’t sign up for BreachWatch, simple.
Avoiding BreachWatch doesn’t hinder the normal functionality of the service.
Deleted Items can be a useful feature if you regularly trim off your vault database of junky credentials.
It can save and later restore any deleted record, much like the Recycle Bin functions in Windows.
If you’re the kind who saves and forgets–this function holds little value.
Themes add to the list of fancy features. You can choose different color themes for the vault.
Keeper also has a encrypted secure file storage that works similar to Google Drive.
It makes sense only if you store and share confidential digital information routinely, like a secret services official.
Using this, you can also share files with other Keeper users. All files are securely encrypted as per Keeper, allowing only the intended recipient to decrypt them.
Keeper’s free plan is much restricted, with no web vault and desktop-app access. It permits working on a single mobile device with two-factor authentication and export as additional functions.
Its paid plan charges 34.99$ annually for its unlimited plan; 58.47$ if you include BreachWatch and Secure File storage along with the basic (called unlimited plus bundle).
For a family of five, these charges mount up to 74.99$ and 103.48$ annually for unlimited and unlimited plus bundle respectively.
Students can get a 50% waiver on these charges.
Keeper also covers businesses with plans starting 45$ annually per user.
Verdict: Keeper Password Manager and Vault
Initially, it appears a secure and attractive option for anyone looking for a great password manager and willing to pay a decent amount for it.
It has a 30-days trial subscription, one should use it before hitting the road with them.
But for those looking for an economic (or free) alternative with almost all the useful functions barring some fancy goodies, I recommend looking no further than Bitwarden.