How Cyclonis Password Manager Keeps Your Data Encrypted in Your Vault

Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.

Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.

Encrypted with 256-Bit AES

The same encryption algorithm used by governments, financial institutions, and in military applications.

One Master Password

Your vault is designed so that your personal information can only be accessed with your personal master password.

Generates Complex Passwords

Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.

Two-Factor Authentication

This feature is designed to further increase the strength of your vault.

See How It Works

Latest Posts

Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.

How to Use FileVault Without a Secure Token screenshot

How to Use FileVault Without a Secure Token

What is FileVault? FileVault is Apple's disk encryption app first added in Mac OS X 10.3 and all newer version. It executes immediate encryption with volumes on Macs. The original FileVault was introduced with Mac OS...

Read more
June 14, 2019
Phishing Websites Can Exploit the HTTPS Protocol, FBI Warns screenshot

Phishing Websites Can Exploit the HTTPS Protocol, FBI Warns

On Monday, the Internet Crime and Complain Center (IC3) issued a warning which is supposed to make you more vigilant and help you avoid falling victim to a phishing attack. It says that the decision on whether or not...

Read more
June 13, 2019
The Data of 4.6 Million Evernote Users Was Put at Risk Due to a Flaw in the Chrome Extension screenshot

The Data of 4.6 Million Evernote Users Was Put at Risk Due to a Flaw in the Chrome Extension

You've heard how important it is to be careful with the browser extensions you install, and you know what sort of criteria you need to consider before you decide whether or not a particular addon should be allowed...

Read more
June 13, 2019
How to Fix Windows System Image Backup Error (0x80070716) screenshot

How to Fix Windows System Image Backup Error (0x80070716)

System Image Backup is a rather useful Windows tool that allows users to back up a snapshot of their device for later use. The feature creates a copy of everything that the user had stored on their hard drive - from...

Read more
June 13, 2019
Chrome 75 Comes with a Few Interesting Upgrades screenshot

Chrome 75 Comes with a Few Interesting Upgrades

Google Chrome, the favorite browser of about 67% of the internet's population, has a new version. Last week, Google announced the availability of Chrome 75 for Windows, Mac, and Linux, and it's currently being rolled...

Read more
June 12, 2019
Single Sign-On Feature on Social Media Platforms Is a Security Threat screenshot

Single Sign-On Feature on Social Media Platforms Is a Security Threat

These days, it is not a matter of whether you have any kind of account online. It's the question of how MANY accounts you have. The more accounts you have, the more bothersome the sign-on processes become because you...

Read more
June 12, 2019
Are You Sure Your WhatsApp Messages Are Private? screenshot

Are You Sure Your WhatsApp Messages Are Private?

What’s your preferred social networking app when it comes to communicating with your friends and family? If it’s WhatsApp, there are a few privacy concerns. Of course, most apps have a tainted reputation, and we could...

Read more
June 12, 2019
How to Set up a Password to Protect a PDF File in Adobe Reader screenshot

How to Set up a Password to Protect a PDF File in Adobe Reader

Just about everyone uses the PDF file format. The PDF format is very useful and thus very wide-spread among users and businesses. With the PDF format, you can freely send and receive information, your content, and you...

Read more
June 12, 2019
Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware screenshot

Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware

We recently touched upon the problem of vulnerability management and patching. The fact of the matter is, a very large portion of users and organizations that rely heavily on computers are completely unaware of how...

Read more
June 11, 2019
Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute screenshot

Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute

Those of you who have been interested in the online threat landscape for the last few years probably know what Microsoft's Remote Desktop Protocol (or RDP) is. You've seen it being used in more than a few large-scale...

Read more
June 11, 2019
Follow These 4 Steps to Ensure That You Are Safe When Using Google Chrome screenshot

Follow These 4 Steps to Ensure That You Are Safe When Using Google Chrome

Nowadays hackers have various methods to steal our sensitive or private information, and so there are lots of safety measures to consider if you want your data to be secured. Users are often recommended to watch out...

Read more
June 11, 2019
Hackers Exploit Only 5.5% of All Security Vulnerabilities, but That Is Not Good News screenshot

Hackers Exploit Only 5.5% of All Security Vulnerabilities, but That Is Not Good News

How do you deal with security vulnerabilities? Well, for individual users, things shouldn't be too hard. In fact, more often than not, all they need to do is enabled the automatic updates for their software...

Read more
June 10, 2019

View More