Keeper Security Introduces Zero-Trust Database Access to PAM Platform with KeeperDB

Keeper Security Introduces Zero-Trust Database Access to PAM Platform with KeeperDB

4 Min Read

Database credentials continue to be a frequent attack vector in corporate breaches, yet many organizations still manage them via shared spreadsheets, hardcoded connection strings, or standalone credential vaults without session oversight. Keeper Security, a cybersecurity firm in Chicago known for its password management platform, aims to address this with KeeperDB, a new feature that integrates database access controls into its privileged access management (PAM) platform.

The product was unveiled at the RSA Conference 2026 in San Francisco, where Keeper received 18 industry awards in categories like password management, privileged access management, and zero-trust security.

How KeeperDB Operates

KeeperDB introduces a vault-native database access interface within KeeperPAM, Keeper’s unified privileged access management platform. This allows developers, database administrators, and security teams to connect directly to MySQL, PostgreSQL, Oracle, and Microsoft SQL Server databases from the Keeper Vault, without exposing credentials in plaintext or using separate database management tools.

Each database session is managed by centralized policies, with full session recording for audit and compliance purposes. The concept is simple: if organizations already store passwords, secrets, and privileged credentials in Keeper, database access should be there too, avoiding the need for a separate tool with its own credential store.

“KeeperDB represents a natural evolution of our zero-trust architecture,” stated Darren Guccione, CEO and co-founder of Keeper Security. “Embedding database access into the vault eliminates the credential sprawl that creates risk in enterprise environments.”

Addressing the Credential Sprawl Issue

The problem KeeperDB tackles is well-known. Database credentials often spread across configuration files, environment variables, CI/CD pipelines, and individual developer machines. When an employee departs or a credential is compromised, locating every instance of that credential becomes a daunting task.

Traditional database access tools aggravate the issue. Each tool keeps its own connection profiles and saved credentials, creating multiple copies of sensitive information outside any centralized governance framework. For organizations bound by compliance requirements like SOC 2, HIPAA, or PCI DSS, this fragmentation makes audit preparation more time-consuming.

KeeperDB consolidates database access under the same zero-knowledge encryption and policy engine that already manages passwords, SSH keys, API tokens, and remote desktop sessions in KeeperPAM. Credentials are never exposed in plaintext, access is provided based on role-based policies, and every query session is logged.

Proxy Mode for Existing Workflows

Understanding that many teams have set workflows with existing database clients, Keeper is also launching KeeperDB Proxy. This feature allows developers to continue using preferred tools like pgAdmin, MySQL Workbench, or DBeaver while routing connections through Keeper’s infrastructure. The proxy enforces centralized policy, protects credentials, and maintains session visibility without requiring teams to abandon their existing tools.

This pragmatic approach minimizes disruption. Asking database administrators to switch from tools they have used for years can cause friction and hinder adoption. Offering both a native vault interface and a proxy mode, Keeper hopes organizations will choose the path with the least disruption.

A Broader PAM Strategy

KeeperDB is the latest addition to a platform that has significantly expanded beyond its password management beginnings. KeeperPAM now includes password and passkey management, secrets management for DevOps and CI/CD pipelines, privileged session management with recording, remote browser isolation, secure remote desktop, and SSH access via Keeper Connection Manager, plus database access.

The company’s strategy consolidates multiple point solutions into a single platform with a unified credential store and policy engine. For managed service providers (MSPs), Keeper announced a revamped 2026 partner program with tiered discounts and expanded enablement resources, indicating mid-market and channel growth targets alongside direct enterprise sales.

The F1 Connection

Keeper’s presence at RSAC coincided with an increased visibility campaign. As the official cybersecurity partner of the Atlassian Williams F1 Team for a third season, Keeper launched a global advertising campaign in March 2026 with driver Alex Albon. The campaign, filmed during pre-season testing in Bahrain, highlights the parallels between real-time data protection in Formula 1 operations and the identity-first security model Keeper advocates for enterprise environments.

Williams uses KeeperPAM to secure passwords, infrastructure secrets, and privileged accounts at its Grove headquarters and trackside, where race strategy, telemetry, and engineering systems depend on controlled access to sensitive data.

Significance of KeeperDB

The trend KeeperDB symbolizes is the ongoing consolidation of identity and access management tools. Organizations that once used different solutions for password

You might also like