The ultimate security for your passwords | Zoho Vault (2024)

Data Security and Privacy

Zoho Vault leverages the host-proof-hosting technique, a secure, proven mechanism which has found wide acceptance after undergoing extensive testing by security experts. Host-proof-hosting is based on the idea of hosting sensitive data in an encrypted form to ensure clients can only access and manage their data using a master password which is never transmitted to the server. The server is limited to persisting and retrieving only the encrypted data the browser forwards it, and can never actually access the sensitive data in its plain form. All encryption and decryption takes place in the client side (browser).

All passwords and other sensitive data that users store in Zoho Vault remain completely private and can only be viewed by the respective user. All user data gets encrypted and decrypted in the browser with the user's Zoho Vault master password, and only the encrypted data gets stored in Zoho's servers. The user's master password is never stored anywhere by Zoho Vault, meaning even Zoho can never access your data.

Secure Connection

As mentioned above, only encrypted data (AES-256 bit) is sent over the internet. We also mandate that all connections to our servers use Transport Layer Security (TLS 1.2/1.3) encryption with strong ciphers, for all connections.

Tested against vulnerabilities

  • Zoho Vault has been comprehensively tested against cross-site scripting (XSS), SQL injection, and other vulnerabilities.
  • All input data is validated

Secure sharing of passwords

Zoho Vault enables you to securely share passwords among the trusted members of your organization. The sharing process has been designed to follow the highest information security and privacy standards.

The sharing process leverages both host-proof-hosting and RSA encryption. RSA public and private keys are generated for each user of your organization. The organization administrator and users "shake hands" in a one-time process to initiate the sharing process. During that handshake, the keys are shared between the administrator and users. The entire process happens in the background, without the need for any manual action. You can find details of the entire process below, if you're interested in the technical aspect.

  • Step 1
  • Step 2
  • Step 3
  • Step 4

Step 1

When the org administrator signs up with Zoho Vault, an RSA Public-Private key pair is generated for them, along with an Org Key. This Org Key is an AES 256-bit key unique to every organization. The org admin's Private Key is encrypted using their master password and stored in Zoho Vault's database. Similarly, the Org Key is also encrypted using the org admin's RSA Public Key and stored in the database. Zoho Vault only stores the encrypted keys of the org admin's Private Key and Org Key. As per the host-proof-hosting model, the org admin's master password is not stored anywhere on the server. It remains only with the org admin. The ultimate security for your passwords | Zoho Vault (1)

Step 2

When users in your organization sign up with Zoho Vault, an RSA Public-Private Key pair is generated for each of them. The user's private key is encrypted using their master password and stored in Zoho Vault's database.

The ultimate security for your passwords | Zoho Vault (2)

Step 3

When the org admin "shakes hands" with the org user, the encrypted Org Key stored in the database is retrieved and is decrypted using the org admin's Private Key. The Org Key is then encrypted using the user's RSA Public Key and this new encrypted Org Key is shared with the user and stored in their space in the database. This process is done for each user of Zoho Vault.

The ultimate security for your passwords | Zoho Vault (3)

Step 4

When the user tries to share a password, the user's private key (stored in encrypted form in the database) is retrieved and decrypted using the user's master password. The encrypted Org Key that the administrator has shared with the user is then retrieved. The encrypted org key is decrypted using the user's Private Key. The password to be shared is now encrypted using the Org Key.

The ultimate security for your passwords | Zoho Vault (4)

Password Sharing - Flow of Events

Let's use an example. Assume a user John is the admin in the organization and he wants to share one of his existing passwords with, say, five other org users, Maria, Jason, Tracy, Roger, and Amanda.

  • Because the password being shared is owned by John, it is stored in Zoho Vault after being encrypted using John's master password
  • When sharing is initiated, the password is decrypted using John's master password
  • The password is now encrypted using the Org Key and is stored in the database
  • John now shares this password with all five users. Internally, this password, which was encrypted using the Org Key is mapped to Maria, Jason, Tracy, Roger, and Amanda.

How do the users retrieve this password?

  • The users decrypt their respective RSA private keys using their respective master passwords
  • The users then decrypt the encrypted Org Key using their respective RSA private keys (obtained in the previous step)
  • The user retrieves the password using the Org Key.

What happens when a shared password is modified?

Assume that Maria changes the shared password.

  • The shared password is decrypted using the Org Key and shown
  • The new password is encrypted using the Org Key and updated in the database

Important Note:

The Org Key used for encrypting and decrypting shared passwords resides in the browser when passwords are shared in the organization. It is possible for a tech-savvy user to retrieve the Org Key when they're logged in to Zoho Vault. However, this key can only be exploited when the holder gets access to Zoho Vault’s database. Since Zoho's datacenters follow state-of-the-art security protocols, this is nearly impossible. Since Zoho Vault follows the host-proof-hosting technique, it is impossible even for Zoho to access the Org Key.

Zoho's Security Policy

million users rely on Zoho's applications

With over million users accessing Zoho services worldwide, individuals and organizations count on Zoho's security and data protection to meet their needs. We take security very seriously and have developed a comprehensive set of practices, technologies, and policies to help ensure your data is secure. You can refer to Zoho's Security Policy to find in-depth details about our security strategy.

The ultimate security for your passwords | Zoho Vault (2024)

FAQs

Are password vaults a good idea? ›

Are password managers safe? Absolutely. But they are only as effective as the person who is using them. If you use “ABC123” as the password for all of your accounts and turn off multifactor authentication, then it doesn't matter how secure your vault is—someone is going to guess that password eventually.

How does the password vault work? ›

A password vault, password manager or password locker is a program that stores usernames and passwords for multiple applications securely, and in an encrypted format. Users can access the vault via a single “master” password. The vault then provides the password for the account they need to access.

What is the purpose of the Zoho Vault? ›

Just as a physical vault protects your cash, paper documents, jewelry, and other valuables, a password vault like Zoho Vault safely stores all your passwords, signed documents, bank accounts, licenses, social security number, and just about any other sensitive information in one place.

Which password manager has never been hacked? ›

1Password is an option as it has never been breached, and NordPass is also known for its strong security features.

What is the safest place to store your password? ›

If you prefer convenience over security, a password manager is a secure way to store passwords online. When storing passwords offline, a paper password book is the best option. Because pen and paper cannot be hacked, they can keep your passwords safe for years to come.

Is Google password vault safe? ›

While Google Password Manager offers encryption and convenient integration with Google services, there are notable security and privacy concerns. Despite encryption measures, there are still risks and vulnerabilities that users should be aware of. Privacy issues may also arise from Google's data collection practices.

Does Apple have a password vault? ›

iCloud Keychain is Apple's built-in password manager that securely stores and syncs your passwords, credit card information, Wi-Fi passwords, and other secure data across your Apple devices.

How do I unlock my vault password? ›

Android or iOS

In the Vault screen, tap the Menu icon , and then tap Settings. In the Settings screen, tap Reset Password. Approve using biometric authentication. In the Reset password screen, follow the on-screen instructions and tap Save.

Is Zoho Vault safe? ›

Zoho Vault enables you to securely share passwords among the trusted members of your organization. The sharing process has been designed to follow the highest information security and privacy standards. The sharing process leverages both host-proof-hosting and RSA encryption.

Why do people use Zoho? ›

Zoho CRM acts as a single repository to bring your sales, marketing, and customer support activities together, and streamline your process, policy, and people in one platform.

What is Zoho and is it safe? ›

Zoho Mail's encryption helps keep your emails safe by protecting confidential information and preventing data theft because it ensures that only you and the intended recipient can read the emails.

What is the purpose of a password vault? ›

Password vaulting is a technique used to store passwords in a central location and protect them with encryption. The primary purpose of a password vault is to simplify password management by eliminating the need to memorize multiple passwords for different accounts.

Is it safe to use password vault? ›

Yes, they are undeniably the safest way to store your passwords. They provide strong encryption to protect your passwords from cyber criminals. However, it's also important to note that they aren't 100% impenetrable. Over the years, hackers figured out a way to target password manager software.

What is the purpose of a vault? ›

It is intended to protect their contents from theft, unauthorized use, fire, natural disasters, and other threats, much like a safe. Unlike safes, vaults are an integral part of the building within which they are built, using armored walls and a tightly fashioned door closed with a complex lock.

What is the best security practice for storing passwords? ›

Password Best Practices
  • Never reveal your passwords to others. ...
  • Use different passwords for different accounts. ...
  • Use multi-factor authentication (MFA). ...
  • Length trumps complexity. ...
  • Make passwords that are hard to guess but easy to remember.
  • Complexity still counts. ...
  • Use a password manager.

Is Apple password vault safe? ›

iCloud Keychain uses strong encryption (256-bit AES) to scramble your data, making it unreadable by anyone, including Apple itself.

Is paying for a password manager worth it? ›

It's some of the best money you can spend, save from investing in a VPN. Password managers, like 1Password, are made with the express purpose of keeping all your passwords safe. If you happen to forget one, you won't have to trigger a dozen password reset emails just to get back into your precious accounts.

Top Articles
Why Transfer funds from NRO to NRE Account benefits | HDFC Bank
7 Innovative Ways Retailers Are Using Beacon Technology
Xre-02022
Northern Counties Soccer Association Nj
Splunk Stats Count By Hour
Live Basketball Scores Flashscore
Research Tome Neltharus
Greedfall Console Commands
Senior Tax Analyst Vs Master Tax Advisor
Goteach11
Espn Expert Picks Week 2
Goldsboro Daily News Obituaries
How Many Slices Are In A Large Pizza? | Number Of Pizzas To Order For Your Next Party
Persona 4 Golden Taotie Fusion Calculator
Healing Guide Dragonflight 10.2.7 Wow Warring Dueling Guide
Hartland Liquidation Oconomowoc
Top tips for getting around Buenos Aires
2015 Honda Fit EX-L for sale - Seattle, WA - craigslist
Bfg Straap Dead Photo Graphic
Lake Nockamixon Fishing Report
Gemita Alvarez Desnuda
Grandview Outlet Westwood Ky
If you bought Canned or Pouched Tuna between June 1, 2011 and July 1, 2015, you may qualify to get cash from class action settlements totaling $152.2 million
Pirates Of The Caribbean 1 123Movies
Sister Souljah Net Worth
Skycurve Replacement Mat
Cb2 South Coast Plaza
Hrconnect Kp Login
Tamil Movies - Ogomovies
Mini-Mental State Examination (MMSE) – Strokengine
My Reading Manga Gay
How To Improve Your Pilates C-Curve
Boondock Eddie's Menu
Diana Lolalytics
Tmka-19829
20 Best Things to Do in Thousand Oaks, CA - Travel Lens
Letter of Credit: What It Is, Examples, and How One Is Used
Aita For Announcing My Pregnancy At My Sil Wedding
Dispensaries Open On Christmas 2022
Lacy Soto Mechanic
VDJdb in 2019: database extension, new analysis infrastructure and a T-cell receptor motif compendium
Sara Carter Fox News Photos
Ohio Road Construction Map
Vagicaine Walgreens
Sea Guini Dress Code
Lux Funeral New Braunfels
Bumgarner Funeral Home Troy Nc Obituaries
Duffield Regional Jail Mugshots 2023
Wayward Carbuncle Location
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6408

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.