NEW: Share items with hotlinks.
Read more
Start trial
LoginGet started

Endless possibilities

Hypervault is more than a password manager for teams. It’s a digital vault, with endless possibilities. Store any kind of sensitive data, wether it’s business or personal related.
Choose from standard templates (templates that are pre-made) or custom templates (where you can start from scratch and define the necessary fields yourself).


API Keys

Searching for API keys, connection settings, and API documentation in your email, on your computer, or on a specific website can be quite time-consuming. Those platforms are also not the best way to keep your data safe and secure.  Inside Hypervault, storing API attributes and any related data to that API is simple, secure, and […]



A business has to carry out multiple forms of assessments throughout the year. These assessments include employee assessment, elicitation observations, knowledge tests, and documentation reviews. All of them are susceptible to information about the company; you should note that it is essential to store all the assessments safely. With Hypervault, you and your business are […]


Audit information

Audit information refers to data and documentation related to an audit, which is a systematic and independent examination of an organization's financial records and operations. Some examples of audit information include: Financial statements Documents that report an organization's financial performance, such as income statements, balance sheets, and cash flow statements. Supporting documentation Records and documents […]


Client information

Store all sensitive client information in your vault. Add companies, contact persons, EIN numbers, account numbers, banking information, … Company Name The name of the client company. Contact Person The name and contact information of the person responsible for the account. EIN Number The Employer Identification Number (EIN) assigned to the company. Account Number The account […]



Manage all information from your devices in one place. Add warranty documents, manuals, work instructions, … and share the information with your co-workers or clients. Label A unique identifier for the device. Type The general category of the device, such as a laptop or smartphone. Model The specific model of the device, such as a […]


Integration documentation

Integration documentation refers to the documentation that describes how to integrate different systems or components into a larger system. Some examples of attributes that may be included in integration documentation are: Systems The systems or components that are being integrated. Interfaces The points of connection between the systems or components, including any APIs or other […]


Network information

Being careful with network settings is a must. You don’t want to put everything at stake and let an unauthorized person accesses your network from outside. Label A unique identifier for the network information entry. Network Name The name of the network. Wireless Security The type of wireless security used by the network. For example, WEP, […]



Vault for passwords Hypervault has a built-in password manager, made to collaborate between your teams... or your clients. Use the folders in your vault to bring structure to your passwords. Automatically load credentials in login forms, so you don't have to remember your passwords. You can also generate strong passwords here or in your Chrome or […]


Penetration test reports

A penetration test, also known as a pen test, is a simulated cyber attack that is performed by ethical hackers to test the security of a computer system, network, or web application. A penetration test report is a document that summarizes the findings of the pen test and provides recommendations for improving the security of […]


Security procedures

Security procedures are the processes and protocols that are put in place to protect against threats and ensure the security of an organization or system. Some examples of attributes that may be included in security procedures are: Scope The individuals or groups who are subject to the security procedure. Responsibilities The roles and responsibilities of […]


Signed NDA's

Non-disclosure agreements (NDAs) are legal contracts used to protect sensitive information shared between parties, such as trade secrets, proprietary information, and confidential business strategies. NDAs are often used in business partnerships, employment agreements, and other situations where the disclosure of confidential information could be harmful to one or more parties. Due to the sensitive nature […]


Thread models

Thread models are conceptual models that represent the flow of execution of concurrent threads within a computer system. Some examples of attributes that may be included in thread models are: Threads The individual units of execution within the system. Concurrency The ability of the system to execute multiple threads concurrently. Scheduling The process by which […]


Setting up a workspace, creating a structure and inviting your team takes less than 10 minutes.