Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/30/2013
12:48 PM
Dino Londis
Dino Londis
Slideshows
100%
0%

10 Top Password Managers

Tired of being stuck in password hell? Consider these password managers that balance security with convenience.
Previous
1 of 11
Next


In 2011, IBM predictedthat in five years we will not be using passwords to access secure resources such as ATMs and PCs. Instead of entering a PIN or typing a username and password into a PC, we will simply look into a camera or speak a name into a microphone, because our eyes and voices are unique, IBM says.

[Super-strong unique passwords are pointless! Join Dark Reading Radio on Wednesday, Sep. 17, 2014 at 1 p.m. ET for a grown-up conversation about passwords with Cormac Herley of Microsoft Research.]

Biometric recognition replaces the entry point for what password managers are already doing today. Companies such as RoboForm and LastPass provide a platform that requires only one complex password to access your secure websites, credit card information and even documents that you keep inside an encrypted database. Depending on the platform, the database could be stored locally, on the company's servers or even in Dropbox.

Some password managers use browser extensions that keep your data in a local profile, syncing with a cloud server. Because the data is encrypted and transferred through a secure connection, you can be reasonably confident that your data is safe.

Other password managers keep your data on a thumb drive you carry around from computer to computer. With this approach you always know where your data is -- as long as you don't leave it in a PC and walk away.

Some products are free and charge for a mobile premium; others are subscription-based or charge single flat fee. One product, Dashlane, rewards you when you use its service by awarding points you can use to earn discounts on future purchases.

Some password managers offer two-factor authentication, requiring a smartcard as well as your password to log in. With this type of two-factor authentication, even if your password is decrypted, hackers still can't access your account -- but neither can you, if you don't have your smartcard. That's why this type of authentication is usually offered as an option; most customers prefer a less-strict password management service.

All password managers do have one thing in common: They require you to remember one complex password. But complex should not mean hard to remember; it could be a sentence, for example. If you forget your master password, after all, you can't access your data -- and since the company that developed your password manager doesn't have it, you'll have to reset all your passwords and start over.

Password managers also generate complex passwords, provide import and export tools, allow for simple notes and automatically complete online forms for more efficient online checkout. Here are 10 password manager tools worth considering.

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 5   >   >>
ctcusick
50%
50%
ctcusick,
User Rank: Apprentice
9/12/2013 | 4:13:24 PM
re: 10 Top Password Managers
You mean Master Laurianne.
ctcusick
50%
50%
ctcusick,
User Rank: Apprentice
9/12/2013 | 4:09:15 PM
re: 10 Top Password Managers
Ya you did! (err, me too)

Like most of us, our contacts were unknowingly taken from us by many other cloud services and online offerings years ago.

I rarely see a 'Submit' button anymore, it's been made unscrupulously the 'Post' button or similar, but that's what we are doing, submitting. We submit to our greedy masters while making ourselves subservient. We get neither liberty or security. Have you seen the movie "Terms and Conditions May Apply"?

http://www.youtube.com/watch?v...
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:51:50 AM
re: 10 Top Password Managers
And then there are those asinine complaints about the asinine complaints about slides shows. ;-}
Next...
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:50:27 AM
re: 10 Top Password Managers
Anything to make you happy Laurianne!
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:47:56 AM
re: 10 Top Password Managers
Yeah, why give these marketing gurus all of our private and business contact lists, just for a lousy chance to post a comment. Uh-Oh did I sign onto InformationWeek giving InfoWeek my info???
kdillon148
50%
50%
kdillon148,
User Rank: Apprentice
9/12/2013 | 7:44:02 AM
re: 10 Top Password Managers
Why didn't I see Avast! Easy Pass listed? I have it and love it. I also use Avast! Internet Security. Of course I'm only running a small home network with 3 computers, and my X10 home security/surveillance system and in process automated household system.
anon0736263000
50%
50%
anon0736263000,
User Rank: Apprentice
8/31/2013 | 3:59:46 PM
re: 10 Top Password Managers
is it support cloud
Mathew
50%
50%
Mathew,
User Rank: Apprentice
8/9/2013 | 10:58:54 AM
re: 10 Top Password Managers
I second Steve's Password Wallet shout-out. I've likewise been using it since the Palm days. Excellent software, works across desktops and mobile devices, has long done just what it advertises.
ANON1242661523478
50%
50%
ANON1242661523478,
User Rank: Apprentice
7/2/2013 | 2:57:59 AM
re: 10 Top Password Managers
I've found Passpack (passpack.com) to be a great password manager for those business cases where you need to share passwords among certain individuals or groups of people.
devb23
50%
50%
devb23,
User Rank: Apprentice
7/1/2013 | 12:53:07 PM
re: 10 Top Password Managers
I highly recommend SplashId , because i have used it myself. Browser integration is fabulous. Also it is very easy to use. As soon as you create your account, you can actually set a pattern for splashid login, therefore you technically have to remember zero passwords. Extremely secure for USB usages as well. highly recommended.
<<   <   Page 3 / 5   >   >>
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9405
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.
CVE-2020-9406
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service.
CVE-2020-9407
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows attackers to obtain sensitive information by reading the IWEBSERVICE_JSONRPC_COOKIE cookie.
CVE-2020-9398
PUBLISHED: 2020-02-25
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
CVE-2015-5201
PUBLISHED: 2020-02-25
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...