Hyper-secure credential sharing is here – Keeper Security introduces time-limited access and self-destructing records
Cybersecurity company Keeper Security has done that revealed the latest tools designed for encrypted data access and sharing, with time-limited access and self-destructing data.
Privileged access rights can be granted and forgotten, giving user accounts more access than they should have and putting businesses at risk.
These user accounts can be exploited by hackers looking for an easy way to gain access to a network to install malware, especially if the employee associated with the account has left the company and the account has not been deleted. But Keeper Security thinks it has a solution.
Compliance with safety regulations has never been easier
The ability to assign a time frame for file access has the potential to significantly reduce the chance of user permissions being granted and forgotten, improving the zero-trust posture and keeping your files safe and keeping malicious actors out of your network held.
Timed Access can also be used in conjunction with Keeper Secrets Manager, the company says, which can be used by companies that deal with frequent contractors and third parties to limit privilege abuse by “scheduling an automatic rotation of a shared credential when expiry of the period of validity”. of access.”
Self-destructing records build on this double-layered security by automatically deleting sensitive files after a certain period of time once they are opened by the recipient. Keeper Security suggests that this would be especially useful for use in the onboarding process, where providing credentials to a new starter can be done securely and remotely.
“Implementing time-limited access and self-destructing records is a significant step forward in securely sharing credentials and addressing the risks associated with privilege escalation,” said Craig Lurey, CTO and co-founder of Keeper Security. “These features allow both individuals and organizations to share information securely, providing a higher level of control over data access.”