Getting More Out Of Passwordstate

Passwordstate commenced development way back in 2004, as a result of witnessing first hand, the number of clients that had adopted poor Password Management practices.  Approaches such as storing simple passwords, in unprotected spreadsheets, stored on network file shares and personal computers, posed a real risk to these clients.  And we weren’t just talking about small businesses.  Our clientele came from industry verticals including Property Management, Gaming & Entertainment, Hospitality, Health & Fitness, Lotteries and Agriculture.

Passwordstate has come a long way since those early days.  Today we can boast having more than 29,000 Customers and 370,000 Security & IT Professionals globally, spanning industry verticals including Defence, Banking & Finance, Media and Entertainment, Space & Aviation, Education, Utilities, Retail, Mining, Automotive, Service Providers and IT Security Integrators.  Please note, the screenshot below is of V2.0.  We’ve intentionally removed all images of V1.0 as it didn’t look all that flash.

Passwordstate’s Core Functionality Is…

All about the secure storing, management and use of credentials.  The approach taken in Passwordstate is the same regardless of the credentials being Shared or Private

Access to Shared Password Lists, and the Password Records contained within those Lists are permission based.  The same is true in principle with Private Password Lists and Records, except that with these you’re prevented from sharing or granting access to these Lists and Records at a system level (and there are no workarounds while they remain Private).

But that’s not all that Passwordstate has to offer.  In the Core functionality to can also perform Privileged Account Management, discover local accounts on equipment (such as switches and servers), change then password for those accounts and mange them from that point onwards.  You can also store documents relating to Work Instructions, Change Approvers (or anything at all).

Extend Access to Credentials

Once you’ve got your credentials securely centralized, you can extend access to these using our Android and iOS Mobile Apps.  The Mobile Apps use an independent credential set per user and store password records on the smartphone within an encrypted cache.  This encrypted cache can have a ‘Time to Live’ of up to 30 days, with the value configurable by your Security Administrator.  You can also assign permissions on who is permitted to use the Mobile Apps based on User and Security Groups.

All authentication and access of credentials is audited and synced back automatically with Passwordstate on next connection so there is always an audit trail on credentials that have been accessed.

Once you have the Mobile App installed you can do away with any existing Authenticator Apps.  Access to your One-Time Password codes can be done right in the Passwordstate Mobile App.  This means when you replace your device you can automatically synchronize all applicable Credentials and OTP Codes to the new device,

Self-Destruct Messages

You can also use Self Destruct Messaging, allowing you to send messages containing content highly confidential information, that can only be viewed for a specified period of time.  The content you share is stored only within the Passwordstate Self Destruct Messaging portal.  You specify who can send Self Destruct Messages and control both the ‘Time to Live’ and number of times the data or a Password Record can be viewed.

When the recipient views the content of a Self Destruct Message it is presented via the Passwordstate Self Destruct Messaging portal,

Remote Host Connections

Passwordstate has 2 first-in-class Remote Access Solutions, a Browser Based Launcher and a Client Based LauncherThese are included with the core Passwordstate product and at no additional cost.

The key advantage for these built-in launchers is the use of Remote Session Credentials which enable automatic authentication to your remote hosts.  This feature is especially useful for enabling contractors or vendors accounts to be configured for authenticating to hosts without having to have access to the password record.  The encrypted credentials are retrieved from Passwordstate, sent to the Remote Session Launcher utility/gateway, decrypted and passed to the remote client. 

While the Browser Based Launcher only supports RDP and SSH connections you also have the ability to record sessions and be able to playback the Session Recordings at a later time.

It’s Not Just About Passwords!

Passwordstate can be used to record many types of information, from Credit Cards, Hardware Maintenance Contracts, Software License Keys to SSL Certificates and many more.  This allows you to record and use many types of business information, that is both associated and unassociated with the credentials you manage.

It allows you to share the information with those that need it and maintain a full audit trail of all access to that information.

You may think that Passwordstate is just an effective and affordable Enterprise Password Management System.  But it can offer so much more, and while it isn’t designed to be a complete document management system or Remote Desktop Solution, it offers some of the functionality of more expensive 3rd party solutions at no additional cost.  You can get more out of Passwordstate, you just need to think about how else you can use it.

If you’d like to share your feedback please send it through to support@clickstudios.com.au.