Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:17 PM
Dark Reading
Dark Reading
Products and Releases

Dashlane Announces Dashlane Business 2.0

Launch of latest enterprise password management solution lets IT administrators educate, onboard, and enforce corporate password policies.

NEW YORK – Dashlane announces Dashlane Business 2.0, the only enterprise password solution backed by a U.S. patented security architecture. When it comes to reducing the risk of a breach from poor credential management, you’re only as good as the breadth of your coverage. Dashlane Business 2.0 is an easy-to-deploy, easy-to-adopt, password management solution that strengthens organizational password security and reduces unsecure password sharing.

Enterprise-Level Security, Consumer-Friendly UI
Dashlane Business provides world-class security, as well as an award-winning end-user experience. This exceptional combination means most organizations reach 100% employee adoption almost immediately after initial deployment. Additionally, employees are guided through an onboarding process that’s been optimized to successfully onboard Dashlane’s 8 million consumer users.

Dashlane Business 2.0 is also the only solution that provides visibility into whether employees are reusing passwords across personal and work accounts. Dashlane monitors the strength of all of employee passwords and alerts Admins when passwords are reused, weak, or compromised.

“CEOs, senior IT executives, and their Boards realize they do not have the ability nor the desire to oversee 100% of all cloud applications used by employees,” said Dashlane CEO, Emmanuel Schalit.  “Dashlane Business is a quick, reliable way to educate and on-board non-technical users, while leveling up security and improving password practices across their entire organization.”

Features that Fortify
New Dashlane Business 2.0 features afford convenience and time saving benefits to companies while encouraging the security and password behavior organizations need to stay secure:

  • Group Sharing: Admins can easily create custom groups to safely share and distribute passwords company-wide. Passwords can be added, updated, and removed from a group, and new users can be added to an existing group for quick onboarding.
  • Zero-Knowledge Account Recovery: Dashlane Business has the first Zero-Knowledge Account Recovery for end-users who have forgotten their Master Password. This patent pending implementation preserves a zero-knowledge architecture while giving users and admins added peace of mind and eliminating “forgot password” helpdesk requests. 
  • Active Directory Integration: Admins can now provision and deprovision users automatically as they are created or removed from the Active Directory. When a user is added via Active Directory, they are invited to their new Dashlane account and seamlessly onboard.
  • SAML Provisioning/Deprovisioning: Support for SAML provisioning and deprovisioning is yet another way Business 2.0 saves time, deleting accounts in one-click and eliminating the need to create user accounts in advance.

The Perfect Solution Across Work/Life Boundaries
Employees are using the same digital accounts at both home and work, blurring the line between personal and professional identity. Only Dashlane offers Smart Spaces™, which makes it super simple for employees to store their corporate passwords in one Space and personal accounts in another, all within the same Dashlane account. Companies can customize policies around the handling of corporate passwords and have absolutely no access to the personal credentials. 

“Ensuring that all employees are trained and actually use technical software is difficult. We conducted deep dives with organizations that successfully deployed Dashlane Business to learn from their successes. These sessions helped us make Dashlane Business 2.0 easier than ever to encourage user adoption and deploy for admins,” Schalit stated.

Password Practices as Reported by Employees & IT Administrators 

Employees are the biggest cybersecurity threat to organizations. According to a survey of 500+ IT Administrators and enterprise employees, nearly half (46%) of employees say they use personal passwords to protect company data. These passwords are often weak and meet the bare minimum password requirements. Reusing these weak passwords greatly increases the risk of compromising multiple personal and work accounts during a data breach.

  • Hackers May Care, but Employees Don’t
    • Employees said they would trust their spouse (67%) or a friend (17%) with work passwords.
    • Over 70% of employees said they are not concerned about causing a breach.
  • Ignorance is not bliss.
    • One in five employees do not even know if their company has a password policy, and almost one in three don’t know if they follow it.
    • Companies contribute to this password security ignorance by failing to train more than half (55%) of the employees who are entrusted with company password protected systems, data, and devices.
  • Hello, IT Department?
    • Over 75% of IT Admins believe their employees have password fatigue - the feeling experienced by people who are required to remember an excessive number of passwords as part of their daily routine.
    • While over half of IT Admins say they are concerned about bad password practices in the workplace, 45% still say they are not concerned at all. 
      • What’s more, 70% of IT Admins do not consider an employee password getting into the hands of a hacker among their top five IT-related concerns.

To learn more about Dashlane Business 2.0, visit: www.dashlane.com/business


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-07
An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them.
PUBLISHED: 2021-03-07
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened r...
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length...
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system...