Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/30/2013
12:48 PM
Dino Londis
Dino Londis
Slideshows
100%
0%

10 Top Password Managers

Tired of being stuck in password hell? Consider these password managers that balance security with convenience.
Previous
1 of 11
Next


In 2011, IBM predictedthat in five years we will not be using passwords to access secure resources such as ATMs and PCs. Instead of entering a PIN or typing a username and password into a PC, we will simply look into a camera or speak a name into a microphone, because our eyes and voices are unique, IBM says.

[Super-strong unique passwords are pointless! Join Dark Reading Radio on Wednesday, Sep. 17, 2014 at 1 p.m. ET for a grown-up conversation about passwords with Cormac Herley of Microsoft Research.]

Biometric recognition replaces the entry point for what password managers are already doing today. Companies such as RoboForm and LastPass provide a platform that requires only one complex password to access your secure websites, credit card information and even documents that you keep inside an encrypted database. Depending on the platform, the database could be stored locally, on the company's servers or even in Dropbox.

Some password managers use browser extensions that keep your data in a local profile, syncing with a cloud server. Because the data is encrypted and transferred through a secure connection, you can be reasonably confident that your data is safe.

Other password managers keep your data on a thumb drive you carry around from computer to computer. With this approach you always know where your data is -- as long as you don't leave it in a PC and walk away.

Some products are free and charge for a mobile premium; others are subscription-based or charge single flat fee. One product, Dashlane, rewards you when you use its service by awarding points you can use to earn discounts on future purchases.

Some password managers offer two-factor authentication, requiring a smartcard as well as your password to log in. With this type of two-factor authentication, even if your password is decrypted, hackers still can't access your account -- but neither can you, if you don't have your smartcard. That's why this type of authentication is usually offered as an option; most customers prefer a less-strict password management service.

All password managers do have one thing in common: They require you to remember one complex password. But complex should not mean hard to remember; it could be a sentence, for example. If you forget your master password, after all, you can't access your data -- and since the company that developed your password manager doesn't have it, you'll have to reset all your passwords and start over.

Password managers also generate complex passwords, provide import and export tools, allow for simple notes and automatically complete online forms for more efficient online checkout. Here are 10 password manager tools worth considering.

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 5   >   >>
ctcusick
50%
50%
ctcusick,
User Rank: Apprentice
9/12/2013 | 4:13:24 PM
re: 10 Top Password Managers
You mean Master Laurianne.
ctcusick
50%
50%
ctcusick,
User Rank: Apprentice
9/12/2013 | 4:09:15 PM
re: 10 Top Password Managers
Ya you did! (err, me too)

Like most of us, our contacts were unknowingly taken from us by many other cloud services and online offerings years ago.

I rarely see a 'Submit' button anymore, it's been made unscrupulously the 'Post' button or similar, but that's what we are doing, submitting. We submit to our greedy masters while making ourselves subservient. We get neither liberty or security. Have you seen the movie "Terms and Conditions May Apply"?

http://www.youtube.com/watch?v...
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:51:50 AM
re: 10 Top Password Managers
And then there are those asinine complaints about the asinine complaints about slides shows. ;-}
Next...
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:50:27 AM
re: 10 Top Password Managers
Anything to make you happy Laurianne!
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:47:56 AM
re: 10 Top Password Managers
Yeah, why give these marketing gurus all of our private and business contact lists, just for a lousy chance to post a comment. Uh-Oh did I sign onto InformationWeek giving InfoWeek my info???
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:44:02 AM
re: 10 Top Password Managers
Why didn't I see Avast! Easy Pass listed? I have it and love it. I also use Avast! Internet Security. Of course I'm only running a small home network with 3 computers, and my X10 home security/surveillance system and in process automated household system.
anon0736263000
50%
50%
anon0736263000,
User Rank: Apprentice
8/31/2013 | 3:59:46 PM
re: 10 Top Password Managers
is it support cloud
Mathew
50%
50%
Mathew,
User Rank: Apprentice
8/9/2013 | 10:58:54 AM
re: 10 Top Password Managers
I second Steve's Password Wallet shout-out. I've likewise been using it since the Palm days. Excellent software, works across desktops and mobile devices, has long done just what it advertises.
ANON1242661523478
50%
50%
ANON1242661523478,
User Rank: Apprentice
7/2/2013 | 2:57:59 AM
re: 10 Top Password Managers
I've found Passpack (passpack.com) to be a great password manager for those business cases where you need to share passwords among certain individuals or groups of people.
devb23
50%
50%
devb23,
User Rank: Apprentice
7/1/2013 | 12:53:07 PM
re: 10 Top Password Managers
I highly recommend SplashId , because i have used it myself. Browser integration is fabulous. Also it is very easy to use. As soon as you create your account, you can actually set a pattern for splashid login, therefore you technically have to remember zero passwords. Extremely secure for USB usages as well. highly recommended.
<<   <   Page 3 / 5   >   >>
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.
CVE-2012-1592
PUBLISHED: 2019-12-05
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
CVE-2019-16770
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
CVE-2019-19609
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.