G2 Crowd Acquires Siftery to Create a New Way to Buy and Manage Software Spend šŸš€



Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.

Work for Keeper?

Learning about Keeper?

We can help you find the solution that fits you best.

Find the Right Product

Keeper Features

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

Not enough data available

Supports Required Authentication systems

Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.

Not enough data available

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.

Not enough data available

Supports Required Authentication Methods/Protocols

Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case

Not enough data available

Federation/SAML support (idp)

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

Not enough data available

Federation/SAML support (sp)

Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.

Not enough data available

Access Control Types

Endpoint access

Provides ability to control access to PC's, Mobile devices, and other endpoint devices.

Not enough data available

Local Access

Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.

Not enough data available

Remote Access

Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.

Not enough data available

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

Not enough data available

Supports BYOD users

Enables users to use their own device to access company applications.

Not enough data available

Usability & Access

Quick Login

Expedites user logins using methods like a master password or password autofill.

(Based on 45 reviews)

Browser Extension

Integrates the tool with your browser for easy use.

(Based on 39 reviews)

Mobile App Usability

Integrates with your mobile device for use on mobile apps.

(Based on 44 reviews)

Multi-Device Use

Enables user to use the tool across multiple devices.

(Based on 39 reviews)

Admin Management

Allows an employer or administrator to manage employee access.

(Based on 24 reviews)


Ease of installation on server

Installation process is easy and flexible.

Not enough data available

Password Policy Enforcement

Options for resetting and enforcing password policies

Not enough data available

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data available

Ease of connecting applications

Easily provisions new systems, platforms or applications using configuration and not customization.

Not enough data available

Self Service Password Administration

Users can set, change passwords without interaction from IT staff

Not enough data available

Security Measures

Password Generator

Generates passwords for each of your logins.

(Based on 38 reviews)

Two-Factor Authentication

Provides extra security by requiring an extra for of verification in addition to a password.

(Based on 35 reviews)

Security Audits

Analyzes and evaluates the quality and variety of your passwords.

(Based on 27 reviews)


Multiple Operating system support

Supports Endpoint access control to multiple operating systems

Not enough data available

Multi-Domain Support

Allows user authentication to be honored by all the hosts in two or more domains

Not enough data available

Cross Browser support

Support access to browser based applications across required browser types

Not enough data available

Fail over protection

Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate

Not enough data available

Third Party Web Services support

Can call and pass credentials to third party web services.

Not enough data available


Contains pre-built and custom reporting tools to required to manage business

Not enough data available


Provides mechanism for auditing authentication for trouble shooting purposes.

Not enough data available


Digital Wallet

Stores records like credit cards or receipts in addition to passwords.

(Based on 18 reviews)

File Storage

Stores files in addition to passwords.

(Based on 26 reviews)