Keeper Security, a leader in zero-trust and zero-knowledge identity security, has announced the introduction of KeeperDB. This new vault-embedded database access capability is designed to facilitate secure, policy-controlled interactions directly from the Keeper Vault. By integrating database session management into its existing Privileged Access Management (PAM) platform, Keeper Security aims to provide developers, database administrators, and security teams with a unified interface that simplifies workflows while maintaining rigorous access governance. KeeperDB is scheduled for its official launch at the RSA Conference 2026.
KeeperDB enables secure database interactions directly from the Keeper Vault.
The tool supports major databases including MySQL, PostgreSQL, Oracle, and Microsoft SQL Server.
It eliminates credential exposure by ensuring database logins are never revealed to users.
Features include full visual session recording of database activity for audit readiness.
Users can connect via a Graphical User Interface (GUI) or Command-Line Interface (CLI).
The platform reduces data exfiltration risks through granular controls and read-only access.
Enterprise databases remain high-value targets for cyberattacks and insider misuse, often due to fragmented management through desktop tools and shared credentials. KeeperDB addresses these vulnerabilities by broadening the KeeperPAM platform with a vault-native interface. This integration allows organizations to apply centralized policies and record all sessions for compliance purposes. Standardizing these workflows helps to reduce credential sprawl and strengthens an organization's security posture across both cloud and on-premises environments.
"Database access has historically been one of the most used yet least-governed areas of enterprise security," said Darren Guccione, CEO and Co-founder of Keeper Security. "KeeperDB brings database management into the vault – allowing organizations to apply the same zero-trust controls, visibility and auditing they rely on for privileged access – without introducing new tools, credentials or attack paths."
A primary objective of KeeperDB is to improve usability for technical teams without compromising zero-trust principles. The browser-based interface allows users to launch sessions directly from database records within the vault. For teams that prefer existing database clients, the solution is complemented by KeeperDB Proxy. This ensures that even when external clients are used, connections remain secure through centralized policy enforcement and credential protection, maintaining total session visibility.
"Most database access today happens through disparate tools that sit outside security controls," said Craig Lurey, CTO and Co-founder of Keeper Security. "We built KeeperDB so teams can work the way they're used to, but inside a zero-trust environment. It's a simpler, safer way to manage database access that enhances productivity."
Beyond simple access management, KeeperDB focuses on preventing data exfiltration through governed data transfer policies. By providing a modern interface that records every action visually, the platform significantly enhances an organization's ability to meet strict regulatory requirements. As part of the broader KeeperPAM ecosystem, KeeperDB represents an evolution in how infrastructure secrets and remote connections are secured, utilizing role-based enforcement and least-privilege access to protect critical business data.
About Keeper Security
Keeper Security is one of the fastest-growing cybersecurity software companies that protects thousands of organizations and millions of people in over 150 countries. Keeper is a pioneer of zero-knowledge and zero-trust security built for any IT environment. Its core offering, KeeperPAM®, is an AI-enabled, cloud-native platform that protects all users, devices and infrastructure from cyber attacks. Recognized for its innovation in the Gartner Magic Quadrant for Privileged Access Management (PAM), Keeper secures passwords and passkeys, infrastructure secrets, remote connections and endpoints with role-based enforcement policies, least privilege and just-in-time access.