KeeperDB Brings Zero Trust Database Access to Privileged Access Management



Database credentials remain one of the most common attack vectors in enterprise breaches; However, most organizations still manage them through shared spreadsheets, encrypted connection strings, or separate credential vaults without session monitoring. Keeper Security, the Chicago-based cybersecurity company best known for its password management platform, is attempting to close that gap with KeeperDB, a new capability that builds database access controls directly into its privileged access management (PAM) platform.

The product was announced at the RSA 2026 Conference in San Francisco, where Keeper also earned 18 industry awards in categories including password management, privileged access management, and zero trust security.

What KeeperDB actually does

KeeperDB adds a native vault database access interface to KeeperPAM, Keeper’s unified privileged access management platform. In practical terms, this means that developers, database administrators, and security teams can connect to MySQL, PostgreSQL, Oracle, and Microsoft SQL Server databases directly from Keeper Vault, without exposing credentials in plain text or relying on separate database management tools.

Each database session is governed by centralized policies, with full session recording for auditing and compliance purposes. The idea is simple: if organizations already store their passwords, secrets, and privileged credentials in Keeper, access to the database should be there too, rather than requiring a separate tool with its own credential store.

“KeeperDB represents a natural evolution of our zero trust architecture“said Darren Guccione, CEO and co-founder of Keeper Security. “By building database access directly into the vault, we eliminate the dispersion of credentials that creates risk in most enterprise environments.”

The problem of credential dispersion

The challenge KeeperDB addresses is well documented. Database credentials in most organizations are scattered across configuration files, environment variables, CI/CD pipelines, and individual developer machines. When an employee leaves or a credential is compromised, tracking down every instance of that credential becomes an exercise in archeology.

Traditional database access tools exacerbate the problem. Each tool maintains its own connection profiles and saved credentials, creating multiple copies of sensitive information outside of any centralized governance framework. For organizations subject to SOC 2, HIPAA, PCI DSSor similar compliance requirements, this fragmentation makes audit preparation much more time-consuming.

KeeperDB’s approach consolidates database access under the same zero-knowledge encryption and policy engine that already governs passwords, SSH keys, API tokens, and remote desktop sessions in KeeperPAM. Credentials are never exposed to users in plain text, access is granted based on role-based policies, and each query session is logged.

Proxy mode for existing workflows

Keeper recognizes that many teams have established workflows with existing database clients and also introduces KeeperDB Proxy. This add-on feature allows developers to continue using their preferred tools (pgAdmin, MySQL Workbench, DBeaver, and similar clients) while routing connections through the Keeper infrastructure. The proxy maintains centralized policy enforcement, credential protection, and session visibility without requiring teams to leave their existing tools.

This is a pragmatic concession. Asking DBAs to abandon tools they’ve used for years is a reliable way to create friction and reduce adoption. By offering a native vault interface and proxy mode, Keeper is betting that organizations will take the path that creates the least disruption.

A broader PAM strategy

KeeperDB is the latest addition to a platform that has expanded considerably beyond its password management origins. KeeperPAM now includes password and access key management, secrets management for DevOps and CI/CD pipelinesprivileged session management with recording, remote browser isolation, secure remote desktop and SSH access via Keeper Connection Manager, and now database access.

The company’s strategy is to consolidate multiple point solutions into a single platform with a single credential store and a single policy engine. For managed service providers (MSPs), Keeper in February announced a revamped partner program for 2026 with tiered discounts and expanded enablement resources, suggesting midmarket and channel are key growth targets alongside direct enterprise sales.

The F1 connection

Keeper’s presence at RSAC coincided with the company’s broader visibility push. Now in its third season as the official cybersecurity partner of the Atlassian Williams F1 team, Keeper launched a global advertising campaign in March 2026 featuring driver Alex Albon. The campaign, filmed during pre-season testing in Bahrain, draws parallels between the real-time data protection required in Formula 1 operations and the identity-first security model that Keeper promotes for enterprise environments.

Williams uses KeeperPAM to protect passwords, infrastructure secrets and privileged accounts both at its Grove headquarters and at the track, where race strategy, telemetry and engineering systems depend on tightly controlled access to sensitive data.

What this indicates

The broader trend that KeeperDB reflects is the continued consolidation of identity and access management tools. Organizations that once maintained separate solutions for password management, secrets management, privileged access, remote connectivity, and database access are increasingly seeking unified platforms that reduce complexity and the number of credential stores to protect.

Keeper is not the only provider following this strategy. CyberArk, BeyondTrust and Delinea have expanded their PAM platforms in recent years. What sets Keeper’s approach apart is its zero-knowledge architecture (meaning Keeper’s own servers cannot access customer data) and its consumer-grade user experience, which the company says drives higher adoption rates than traditional enterprise PAM tools.

KeeperDB is now available for KeeperPAM customers, with support for MySQL, PostgreSQL, Oracle, and Microsoft SQL Server. KeeperDB Proxy is expected to follow in a later release.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *