shield-flash-fill
NEW RELEASE
User Provisioning and SSO with Microsoft Azure AD
Lees meer
chat-2-fill
Start proef
LoginStart je proefperiode
Hypervault | KMO's

A password manager with Endless possibilities

Hypervault is more than a password manager for teams. It’s a digital vault, with endless possibilities. Store any kind of confidential data, wether it’s business or personal related.

Categories

Categories
  • Accounting (10)
  • Architects (3)
  • Development (11)
  • Events (3)
  • Finance (8)
  • General business (14)
  • Healthcare (1)
  • Home security (7)
  • HR (12)
  • Verzekeringen (8)
  • IT (17)
  • Juridisch (10)
  • Beheer (11)
  • Marketing (3)
  • Operations (3)
  • Pharma (2)
  • Real estate (5)
  • Verkoop (3)
  • Veiligheid (12)

Access point informatie

Access point information is critical for businesses and organizations that rely on wireless networks. It is important to understand the sensitive attributes of access point information, as unauthorized access to this information can compromise the security of the network and potentially expose confidential data. In this section, we will discuss the sensitive attributes of access […]

View

Jaarrapporten

Annual reports are a great way to ensure the company's accomplishments are always on display. If you want to keep them safe and secure for future references—and if you're going to ensure that you can access them when needed without going through thousands of folders —you need to store them in a digital format. With […]

View

API Keys

Searching for API keys, connection settings, and API documentation in your email, on your computer, or on a specific website can be quite time-consuming. Those platforms are also not the best way to keep your data safe and secure.  Inside Hypervault, storing API attributes and any related data to that API is simple, secure, and […]

View

Goedgekeurde designs & layouts

If you're a project manager, product owner, or designer, you probably have a bunch of designs and layouts that are approved at a specific moment by your client. But what do you do with them? How can you store them as a backup and reference point when something goes wrong or when the client disagrees […]

View

Beoordelingen

A business has to carry out multiple forms of assessments throughout the year. These assessments include employee assessment, elicitation observations, knowledge tests, and documentation reviews. All of them are susceptible to information about the company; you should note that it is essential to store all the assessments safely. With Hypervault, you and your business are […]

View

Audit informatie

Audit information refers to data and documentation related to an audit, which is a systematic and independent examination of an organization's financial records and operations. Some examples of audit information include: Financial statements Documents that report an organization's financial performance, such as income statements, balance sheets, and cash flow statements. Supporting documentation Records and documents […]

View

Claims

Insurance claims often involve sensitive and confidential information that must be carefully managed to protect the privacy of the claimant and to ensure that the claims process is fair and impartial. Sensitive attributes of insurance claims may include personal information such as the claimant's name, address, and social security number, as well as details about […]

View

Klantinformatie

Store all sensitive client information in your vault. Add companies, contact persons, EIN numbers, account numbers, banking information, … Company Name The name of the client company. Contact Person The name and contact information of the person responsible for the account. EIN Number The Employer Identification Number (EIN) assigned to the company. Account Number The account […]

View

Computer accounts

Store all the account information from your clients and/or colleagues in one platform. Add guides and installation instructions. Label A unique identifier for the computer account User First Name The first name of the user associated with the computer account User Last Name The last name of the user associated with the computer account Device The […]

View

Contracten

A contract is a legally binding agreement between two or more parties that establishes rights and obligations. Some of the attributes that may be included in a contract are: Parties The names and contact information of the individuals or organizations entering into the contract. Purpose The reason for the contract and the specific goods or […]

View

Kredietkaart informatie

In any business with multiple employees, the question ‘can I use the company’s credit card to make a payment’ is posed plenty of times. There is even a possibility that your business even has more than one card.  Hypervault lets you store the credit card information in a custom template, so you can easily share […]

View

Schaderapporten

Damage reports are important documents that provide information about any damage that has occurred to a property, vehicle, or other item. These reports often contain sensitive information, such as personal identifying information or financial data. Here are some examples of sensitive attributes that may be included in a damage report: Personal Information Personal information such […]

View

Databases

Storing and sharing database connections can be quite painful. With the specific database template you can enter all the details of the connection settings. When you’re in need to enter additional information, you can always add custom fields to your database template. Label A name or label used to identify the database Host The hostname or IP address of the server hosting the […]

View

Apparaten

Manage all information from your devices in one place. Add warranty documents, manuals, work instructions, … and share the information with your co-workers or clients. Label A unique identifier for the device. Type The general category of the device, such as a laptop or smartphone. Model The specific model of the device, such as a […]

View

Diploma's

Keep track of your employees' diplomas, certifications, attestations, and courses. Safely store and share the information with the beneficial owner in a secured encrypted environment. Personal information Name, date of birth, place of birth, photograph, and any other identifying information Educational information Institution name, degree or diploma type, major or field of study, grades or […]

View

Documents

Documents come in many forms. Contain your most valuable documents and resources for businesses, employees, and clients in an encrypted vault. 

View

E-mailinstellingen

Store all your information about an email address (including installation instructions) in your vault and share it with co-workers or clients. Never again your team or client will ask to send email settings. A standard template for email configuration Label A short name or label for the email account to easily identify it. Provider The […]

View

Employee contracts

An employee contract is a legal agreement between an employer and an employee that outlines the terms and conditions of employment. Some of the attributes that may be included in an employee contract are: Position The job title and responsibilities of the employee. Compensation The amount of pay the employee will receive and how often […]

View

Energiecertificaten

An energy certificate is a document that certifies the energy performance of a building or other facility. Some attributes that may be included in an energy certificate are: Building type The type of building or facility being certified, such as a single-family home, a multi-family apartment building, or a commercial office building. Address The location […]

View

Evidence information

Collection dates Dates of when the evidence was collected Personal identifying information (PII) Names, addresses, social security numbers, or other unique identifiers Medical or health information Person's medical history, genetic information, or mental health status Financial information Bank account details, credit card numbers, or income information, ... Criminal history or records The password for the […]

View

Facility contracts

Facility contracts are agreements between a company or organization and a facility provider, typically for the use of a physical space or property. These contracts can cover a wide range of facilities, such as office space, warehouses, manufacturing plants, retail spaces, or event venues. The contract may outline the terms and conditions of the facility […]

View

Financial employee info

Financial employee information is sensitive because it contains personal and financial data that is private and confidential. This information is typically used for payroll and other financial purposes and is subject to strict data privacy regulations. Unauthorized access to this information can result in identity theft, financial fraud, and other serious consequences for both the […]

View

Financiële rapporten

Financial reports are documents that provide information about the financial performance and position of a business or organization. Some examples of financial reports include: Financial information Detailed financial statements, including income statements, balance sheets, and cash flow statements Business information Details about company operations, strategies, and financial performance Tax information Details about taxes paid or […]

View

Fleet documenten

Fleet documents refer to the records and documentation related to a fleet of vehicles, such as cars, trucks, or buses. Some examples of fleet documents include: Vehicle registration Documentation that proves ownership of a vehicle and allows it to be legally driven on public roads. Vehicle title A legal document that proves ownership of a […]

View

Floor plans

Floor plans are detailed drawings that show the layout and design of a building or other structure. It is not common for floor plans to contain sensitive information. However, some examples of attributes that may be considered sensitive and could potentially be included in floor plans are: Security features Measures that are put in place […]

View

Oprichtingsdocumenten

Founding documents, such as articles of incorporation, bylaws, and shareholder agreements, are critical legal documents that establish the foundation and structure of a company. They contain sensitive information that defines the company's ownership, management structure, financial structure, and other important details. As such, these documents are often considered confidential and require strict protection. In addition […]

View

FTP

File transfer protocol (or FTP for short) is a protocol that allows computers to transfer files to a server over a network. Store host information, username, password, ports, types, mode in Hypervault. Proper security measures should be taken to protect this information. Username The username used to authenticate the FTP connection Password The password used […]

View

Verzekeringsdocumenten

Insurance documents refer to the documents that provide evidence of insurance coverage. Some examples of insurance documents include: Insurance policy A document that outlines the terms and conditions of the insurance coverage, including the types of risks covered, the limits of coverage, and any exclusions or limitations. Certificate of insurance A document that summarizes the […]

View

Integratie documentatie

Integration documentation refers to the documentation that describes how to integrate different systems or components into a larger system. Some examples of attributes that may be included in integration documentation are: Systems The systems or components that are being integrated. Interfaces The points of connection between the systems or components, including any APIs or other […]

View

IoT

The Internet of Things (IoT) refers to the interconnected network of physical devices, vehicles, buildings, and other objects that are embedded with sensors, software, and network connectivity, allowing them to collect and exchange data. Some attributes of IoT devices include: Connectivity The ability to connect to the internet and exchange data with other devices. Sensors […]

View

Legal case information

Legal case information refers to the data and documentation related to a legal case, such as a lawsuit or a court proceeding. Some examples of attributes that may be included in legal case information are: Parties The individuals or organizations involved in the case, including the plaintiff and the defendant. Cause of action The legal […]

View

Manuals

Your manuals can contain workflows or specific use cases on how to access services or products. This could vary from how people can reset their alarm system, including their personal codes, or entering bank information that has a lot of restrictions. Keep your confidential manuals centralized and share them with the right person. Title The […]

View

Netwerkinformatie

Being careful with network settings is a must. You don’t want to put everything at stake and let an unauthorized person accesses your network from outside. Label A unique identifier for the network information entry. Network Name The name of the network. Wireless Security The type of wireless security used by the network. For example, WEP, […]

View

Notary deeds

It is important to handle notary deeds with care and ensure that they are stored securely to prevent unauthorized access. Access to notary deeds should be restricted only to those who have a legitimate need to access them. Personal identification information Names, addresses, and government-issued identification numbers of individuals involved in the transaction Financial information […]

View

On-boarding instructies

A welcome mail with onboarding instructions to a new employee sounds probably familiar. However, the onboarding email also contains a lot of information and it’s very possible that the email is sent to the bottom of the email list, archived, or deleted. Label A unique identifier or name for the onboarding instruction. Upload onboarding document […]

View

Wachtwoorden

Vault for passwords Hypervault has a built-in password manager, made to collaborate between your teams... or your clients. Use the folders in your vault to bring structure to your passwords. Automatically load credentials in login forms, so you don't have to remember your passwords. You can also generate strong passwords here or in your Chrome or […]

View

Patenten

A patent is a legal document that grants the holder the exclusive right to make, use, and sell an invention for a certain period of time. Some examples of attributes that may be included in a patent are: Title The name of the invention. Inventors The names of the individuals or organizations who developed the […]

View

Payroll informatie

Payroll information is typically confidential and should be protected to ensure the privacy of employees. It is often managed by an accountant or payroll specialist within a company. Employment status Full-time, part-time, contract, temporary, or seasonal Job title The position an individual holds within a company Salary or hourly wage The amount an individual is […]

View

Penetration test reports

A penetration test, also known as a pen test, is a simulated cyber attack that is performed by ethical hackers to test the security of a computer system, network, or web application. A penetration test report is a document that summarizes the findings of the pen test and provides recommendations for improving the security of […]

View

Persoonlijke Identiteitsinformatie

Personal identification information is any information that can be used to identify an individual. This may include: Full name First, middle, and last name Date of birth Month, day, and year of an individual's birth Place of birth City, state, and country of an individual's birth Gender Male, female, or other Marital status Single, married, […]

View

Policy documents

Policy documents are documents that outline the principles, rules, and guidelines that govern an organization or group. Some examples of attributes that may be included in policy documents are: Title The name of the policy Purpose The reason for the policy and the goals it is intended to achieve Scope The individuals or groups to […]

View

Rental Contracts

A rental contract, also known as a lease, is a legally binding agreement between a landlord and a tenant that outlines the terms and conditions for the use and occupancy of a rental property. Some examples of attributes that may be included in a rental contract are: Document The written or electronic document that outlines […]

View

Verkoopscontracten

A sales contract is a legally binding agreement between a buyer and a seller that outlines the terms and conditions of a sale. Some examples of attributes that may be included in a sales contract are: Contract document The written or electronic document that outlines the terms and conditions of the sale. Parties The names […]

View

Veiligheidsprocedures

Security procedures are the processes and protocols that are put in place to protect against threats and ensure the security of an organization or system. Some examples of attributes that may be included in security procedures are: Scope The individuals or groups who are subject to the security procedure. Responsibilities The roles and responsibilities of […]

View

Getekende documenten

Non-disclosure agreements (NDAs) are legal contracts used to protect sensitive information shared between parties, such as trade secrets, proprietary information, and confidential business strategies. NDAs are often used in business partnerships, employment agreements, and other situations where the disclosure of confidential information could be harmful to one or more parties. Due to the sensitive nature […]

View

Software licenties

Keep track of all your software licenses. Label A name or identifier for the software license Registered Email address The email address associated with the license registration License key The unique key or code used to activate the license Licensed to The individual or organization that the license is issued to Company The company or […]

View

SSH connection settings

SSH (Secure Shell) is a network protocol used to securely connect to a remote computer and execute commands on it. Some attributes of SSH connection settings include: Hostname The domain name or IP address of the remote computer. Port The network port number used to establish the connection. The default port number for SSH is […]

View

Subsidies, funding & grants

Subsidies, grants, and funding are financial assistance provided by governments, foundations, and other organizations to support specific projects or initiatives. Some examples of attributes that may be included in subsidies, grants, and funding are: Name The name of the subsidy, grant, or funding program. Purpose The reason for the subsidy, grant, or funding and the […]

View

Belastingaangiftes

Tax documents are documents that are used to report an individual or business's income, expenses, and other financial information to a tax authority, such as the Internal Revenue Service (IRS) in the United States. Some examples of tax documents include: Tax returns A summary of an individual or business's financial information, including income, expenses, and […]

View

Thread models

Thread models are conceptual models that represent the flow of execution of concurrent threads within a computer system. Some examples of attributes that may be included in thread models are: Threads The individual units of execution within the system. Concurrency The ability of the system to execute multiple threads concurrently. Scheduling The process by which […]

View

Valuaties

A valuation is an assessment of the value of an asset or a business. A valuation document is a document that outlines the methodology, assumptions, and conclusions of a valuation. Some examples of attributes that may be included in a valuation document are: Purpose The reason for the valuation and the goals it is intended […]

View

Garantiedocumenten

A warranty is a legally binding promise by a manufacturer or seller to repair or replace a product if it fails to meet certain standards or conditions. A warranty document is a document that outlines the terms and conditions of the warranty. Some examples of attributes that may be included in a warranty document are: […]

View

Het opzetten van een werkruimte, het creëren van een structuur en het uitnodigen van je team duurt minder dan 10 minuten.