A-Z Popular Blog Security Search »
Information Security
Related Guides
Defensive Computing

5 Types of Password Manager

 , updated on
A password manager is a tool that allows a user to manage and access passwords. They may improve security as they encourage users to use strong passwords and avoid reusing passwords. A password manager may also be an improvement on writing passwords down as such notes may be difficult to physically secure. However, password managers represent a single point of failure. If your password manager is compromised, all of your passwords may be compromised. The following are common features of password managers.


Storing or transmitting passwords in an unencrypted format is incredibly risky. It is not advisable to use a password manager that doesn't use strong encryption.

Local vs Cloud

Password managers may store your passwords on your local device or on your cloud account. The benefit of cloud is the ability to use the manager from multiple devices.

Integrated vs Standalone

Password managers may be integrated with tools such as web browsers that allow for convenient features such as form filling.

Password Generation

Tools may offer to generate passwords. Password generation requires sophisticated algorithms that can generate sufficiently random data. Some tools implement relatively naive password generation that isn't particularly secure. For example, the tool's random numbers may be somewhat predictable.

Multi-Factor Authentication

Tools that require two or more pieces of authentication before giving you access to your passwords. For example, a tool might require a smart card and a master password before providing access to passwords. This is generally considered more secure than requiring a master password alone.
Overview: Password Manager
Information Security
Defensive Computing
A tool for securing and accessing passwords.
Encourages users to use strong passwords and avoid reusing the same password on multiple sites.
Represents a single point of failure whereby all your passwords could be compromised if the tool has a security flaw.
Related Concepts

Defensive Computing

This is the complete list of articles we have written about defensive computing.
Data Backup
Offline Network
Patch Management
Strong Password
If you enjoyed this page, please consider bookmarking Simplicable.

Data Backup

Several data backup techniques compared.

Sandbox Definition

An overview of sandboxes. An information security technique.

Strong Password

A few examples of what makes a password strong or weak.

Encryption Examples

A definition of encryption with examples.

Zero-day Vulnerability

An overview of zero-day vulnerability.

Personal Information

A definition of personal information with examples.


A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.


A definition of sandbox with examples.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map