Access point information is critical for businesses and organizations that rely on wireless networks. It is important to understand the sensitive attributes of access point information, as unauthorized access to this information can compromise the security of the network and potentially expose confidential data. In this section, we will discuss the sensitive attributes of access […]
Searching for API keys, connection settings, and API documentation in your email, on your computer, or on a specific website can be quite time-consuming. Those platforms are also not the best way to keep your data safe and secure. Inside Hypervault, storing API attributes and any related data to that API is simple, secure, and […]
Store all sensitive client information in your vault. Add companies, contact persons, EIN numbers, account numbers, banking information, … Company Name The name of the client company. Contact Person The name and contact information of the person responsible for the account. EIN Number The Employer Identification Number (EIN) assigned to the company. Account Number The account […]
Store all the account information from your clients and/or colleagues in one platform. Add guides and installation instructions. Label A unique identifier for the computer account User First Name The first name of the user associated with the computer account User Last Name The last name of the user associated with the computer account Device The […]
Storing and sharing database connections can be quite painful. With the specific database template you can enter all the details of the connection settings. When you’re in need to enter additional information, you can always add custom fields to your database template. Label A name or label used to identify the database Host The hostname or IP address of the server hosting the […]
Manage all information from your devices in one place. Add warranty documents, manuals, work instructions, … and share the information with your co-workers or clients. Label A unique identifier for the device. Type The general category of the device, such as a laptop or smartphone. Model The specific model of the device, such as a […]
Store all your information about an email address (including installation instructions) in your vault and share it with co-workers or clients. Never again your team or client will ask to send email settings. A standard template for email configuration Label A short name or label for the email account to easily identify it. Provider The […]
File transfer protocol (or FTP for short) is a protocol that allows computers to transfer files to a server over a network. Store host information, username, password, ports, types, mode in Hypervault. Proper security measures should be taken to protect this information. Username The username used to authenticate the FTP connection Password The password used […]
Integration documentation refers to the documentation that describes how to integrate different systems or components into a larger system. Some examples of attributes that may be included in integration documentation are: Systems The systems or components that are being integrated. Interfaces The points of connection between the systems or components, including any APIs or other […]
The Internet of Things (IoT) refers to the interconnected network of physical devices, vehicles, buildings, and other objects that are embedded with sensors, software, and network connectivity, allowing them to collect and exchange data. Some attributes of IoT devices include: Connectivity The ability to connect to the internet and exchange data with other devices. Sensors […]
Your manuals can contain workflows or specific use cases on how to access services or products. This could vary from how people can reset their alarm system, including their personal codes, or entering bank information that has a lot of restrictions. Keep your confidential manuals centralized and share them with the right person. Title The […]
Being careful with network settings is a must. You don’t want to put everything at stake and let an unauthorized person accesses your network from outside. Label A unique identifier for the network information entry. Network Name The name of the network. Wireless Security The type of wireless security used by the network. For example, WEP, […]
Vault for passwords Hypervault has a built-in password manager, made to collaborate between your teams... or your clients. Use the folders in your vault to bring structure to your passwords. Automatically load credentials in login forms, so you don't have to remember your passwords. You can also generate strong passwords here or in your Chrome or […]
Policy documents are documents that outline the principles, rules, and guidelines that govern an organization or group. Some examples of attributes that may be included in policy documents are: Title The name of the policy Purpose The reason for the policy and the goals it is intended to achieve Scope The individuals or groups to […]
Security procedures are the processes and protocols that are put in place to protect against threats and ensure the security of an organization or system. Some examples of attributes that may be included in security procedures are: Scope The individuals or groups who are subject to the security procedure. Responsibilities The roles and responsibilities of […]
Keep track of all your software licenses. Label A name or identifier for the software license Registered Email address The email address associated with the license registration License key The unique key or code used to activate the license Licensed to The individual or organization that the license is issued to Company The company or […]
A warranty is a legally binding promise by a manufacturer or seller to repair or replace a product if it fails to meet certain standards or conditions. A warranty document is a document that outlines the terms and conditions of the warranty. Some examples of attributes that may be included in a warranty document are: […]