security password manager

We’ve integrated multiple layers of security to keep your data as safe as possible. Passwords are stored completely encrypted, hashed, with a salt, iterations and PBKDF2. Activate 2 factor authentication for even better security.

Password hashing is one of the most basic security considerations that must be made when designing any application that accepts passwords from users. Without hashing, any passwords that are stored in our application’s database can be stolen if the database is compromised, and then immediately used to compromise not only the application, but also the accounts of users on other services, if they do not use unique passwords.

By applying a hashing algorithm to our user’s passwords before storing them in your database, we make it implausible for any attacker to determine the original password, while still being able to compare the resulting hash to the original password in the future.


PBKDF2 slows down the algorithm with iterations. This will make the job of who’s attacking much harder. Hypervault also adds a salt value to each hash to make it unique so that an attacker can’t attack multiple hashes at the same time.

Attackers try to recover passwords by performing dictionary and brute-force attacks where they guess passwords by hashing them and comparing them to the stored password to determine if they match. With regular cryptographic hash functions (e.g. MD5, SHA256), an attacker can guess billions of passwords per second. With PBKDF2, the attacker can only make a few thousand guesses per second (or less, depending on the configuration).

This means that every password is much stronger if PBKDF2 is used instead of a regular hash function.


Activate your free trial today

Hypervault is coming out of beta this summer.

Complete rebranded, more features for agencies and IT Service Providers, latest security practices, and much more.