Business admin training
Guidance to achieve a successful roll out and improve employee password management habits.
Security and privacy are ever evolving. So is LastPass.
Your data is kept secret, even from us. Only you can unlock your encrypted vault with your Master Password.
LastPass uses AES-256 data encryption plus PBKDF2 hashing with SHA-256 salting.
LastPass maintains a global data privacy program designed to protect the data of customers, users, and end-users.
LastPass holds third-party security certifications like ISO 27001, SOC2 Type II, SOC3, BSI C5, TRUSTe, and more.
LastPass employs trusted, world-class security organizations to conduct routine audits and testing of the LastPass service and infrastructure.
LastPass futureproofs its security measures by supporting a bug bounty program where white-hat hackers can submit found bugs and vulnerabilities.
Generate strong, unique passwords to protect all your accounts, new and old.
Automatically monitor and detect if your information has been exposed online.
Find and update weak and reused passwords from a single security hub.
Autofill credentials only on websites where the URL is a match.
Improve security and the user experience with single sign-on for cloud, legacy, and on-site apps.
Fortify all your accounts by adding extra layers of security prior to obtaining access.
Secure endpoints and balance the user experience wth risk-based, dynamic contextual authentication.
Safely share passwords, files, and sensitive documents with friends, family, or team members.
People secure passwords with LastPass
Best Software Awards for Best Security Product
Password Management Solution of the Year
Leader in Password Management
Based on 1,180 reviews
Businesses choose LastPass
Your single source for the latest security, privacy, compliance, and system performance information.Visit Trust Center
Your data is kept secret, even from us. Learn how LastPass protects your data with a local-only encryption model.Learn more about encryption
Learn the basics of cybersecurity education and terms so you can prevent and respond to security incidents.Read the article
Consult the documentation on product-specific technical, organizational, and compliance measures.View resources