Skip to main content

Help us improve the Digital Marketplace - send your feedback

ACTISOFT TECHNOLOGY LIMITED

Keeper Password Manager

Save employees time, and frustration to eliminate the need for them to reuse and remember passwords. Generate strong random passwords and automatically fill them for users. Keeper is available from any device and location. Everything Keeper does is geared towards quick user adoption and security.

Features

  • Encrypted vault for each user
  • Access from unlimited devices
  • Strong policy engine with enforcement
  • Built-in continuous security audit
  • Advanced activity reporting and an alerts module
  • Two-Factor Authentication
  • BreachWatch by Keeper
  • 1TB Secure storage
  • Active Drectory and LDAP Sync
  • Email auto-provisioning

Benefits

  • Generate strong passwords
  • Protect unlimited passwords in your vault
  • Autofill passwords
  • Login with fingerprint or facial recognition
  • Securely share passwords and logins
  • Organise passwords with folders and categories
  • Zero-Knowledge Security
  • Access and sync your passwords from any of your devices
  • Safely store credit and debit card information
  • Free Family Account

Pricing

£5.59 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bill.slaven@actisofttechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 9 5 6 0 2 6 9 6 6 1 7 9 1 1

Contact

ACTISOFT TECHNOLOGY LIMITED Bill Slaven
Telephone: 0203 931 0199
Email: bill.slaven@actisofttechnology.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Support is limited to supported environments
System requirements
  • Windows 7/8/10+
  • Mac OS 10.10+
  • Chrome
  • Firefox
  • Safari
  • Edge

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 3 working hours Monday - Friday for questions. Support issues responded to in 1 business hour.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Via chatbot on website
Web chat accessibility testing
None to date
Onsite support
Yes, at extra cost
Support levels
Support is included in the monthly fee. On-site support as per rate card. Account contact provided.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
On-site training for admins can be provided at an additional costs otherwise it is provided online with the addition of user documentation
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Via CSV
End-of-contract process
Data can be downloaded by users, help can be provided included in price

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Full functionality on mobile & desktop.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Full details provided - https://docs.keeper.io/enterprise-guide/developer-tools
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Keeper has a large infrastructure in place

Analytics

Service usage metrics
Yes
Metrics types
Admin can view metrics as required via reporting tool and dashboards
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Keeper

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via CSV
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
Built-in Migration tools

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Keeper is hosted on AWS, which has a 99.99% uptime SLA.
Approach to resilience
Available on request
Outage reporting
A Public dashboard

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Defined by role
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • SOC-2
  • FedRAMP
  • ISO 27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We regularly reevaluate critical IT and business functions through Integrated risk management functions Threat and vulnerability analysis Data governance and threat protection Aligning business strategy with IT strategy
Information security policies and processes
Regular reviews to; Categorise and mitigate risks and threats Prepare for identifying, remediating, and recovering from a cyberattack or breach Provide a method for executive leadership to understand our risk posture and maturity levels Outline a risk-based approach with regards to the people, systems, and technology that are used every day

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Audit logs are available. All changes are discussed and reviewed before implementation to insure that the level of security is now lowered without being aware of the risks.
Vulnerability management type
Undisclosed
Vulnerability management approach
Regular reviews of threats. Patches are deployed by the software vendor directly to their service and app.
Protective monitoring type
Undisclosed
Protective monitoring approach
Monitor accounts, alerts and other anomalous activity. Alerts are sent out on certain criteria. Remediation action takes place as soon as an issue is detected. Incidents are responded as soon as they are detected
Incident management type
Undisclosed
Incident management approach
We used a pre-defined NIST framework if an incident occurs. If we are not alerted to incidents by the system a user would report an incident via support ticket or telephone call. Once an incident has been fully investigated and mitigated an incident report will follow.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Allows users to feel safe in the knowledge that their passwords are safe and secure. Free personal family account with for 5 users available to allow them to keep their families passwords safe and secure.

Pricing

Price
£5.59 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full version for 14 days

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bill.slaven@actisofttechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.