Your Business Security
Is Our Priority

The security of your user data is our first priority. Recrypt utilises a combination of the very best security practices available with AES-256 encryption, Google Powered Multi-Factor Authentication and Zero-Knowledge Protocol amongst others.

Try Recrypt for free

Vital Security Features

  • Unbeatable Encryption

    Unbeatable Encryption

    Recrypt protects your information with AES 256-bit encryption and PBKDF2, widely accepted as the strongest encryption available!

  • Google Secure Multi-Factor Authentication

    Google Secure Multi-Factor Authentication

    With two-factor authentication powered by Google Authenticator, only you can access your account on a trusted device.

  • Robust Password Generator

    Robust Password Generator

    Recrypt generates strong, unique passwords and utilises an instant autofill browser extension. In seconds your team can create and save new passwords or log in to an existing account.

Unbeatable Security Encryption

All data secured on Recrypt is encrypted and decrypted on the user’s device, not on the Recrypt Cloud server. If Recrypt did experience a breach, any secrets the user stores are secured by 256-bit encrypted ciphertext in a Chest. Credentials stored in this manner are completely worthless to a potential intruder.

If your data was intercepted during the transmission between a Recrypt Chest and your device, it cannot be decrypted or utilised to attack or compromise your private data.

Hypothetical scenario: 50 supercomputers have the ability to try one billion billion key combinations each second. It would still take them 3×1051 years to exhaust the keyspace under 256-bit encryption.

recrypt password manager

Admin Console

Admin rights allow your most trusted team members to distribute, manage and monitor Recrypt across your business. The Admin console allows you to enforce password security, schedule and run Audit Logs, assign custom permissions per team or individual, and other data security policies.

Administrators can access an audit log for chests, secrets and users to review all activity. See something that looks suspicious? Admins retain the power to immediately place a temporary or permanent block on select users.

Total Admin Control

  • Total Admin Control

    Total Admin Control

    Need to share a group of passwords to a specific development team? Designate chest access to the right team members without compromising the integrity of your company.

  • Security Audit Score and Reporting

    Security Audit Score and Reporting

    Recrypt provides visibility into your password security with robust reporting and auditing tools to enforce internal controls and maintain compliance standards.

  • Shared Folders, Subfolders and Passwords

    Shared Folders, Subfolders and Passwords

    Securely create, share and manage both individual records and encrypted folders across teams or individual users.

Recrypt Security: The White Paper

Do you require an in-depth explanation regarding our encryption methods and Zero-knowledge protocol? We’ve produced a white paper on all on the detailed information you need, click below to read on.

Read More

Did we miss something?
Contact us today

Learn how Recrypt can support your business – complete the following form if you have any questions about the product and our tech team will offer their support.
Contact Us