{"id":10426,"date":"2023-04-27T21:47:28","date_gmt":"2023-04-27T21:47:28","guid":{"rendered":"https:\/\/fieldtrust.be\/?p=10426"},"modified":"2023-04-27T21:56:04","modified_gmt":"2023-04-27T21:56:04","slug":"keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography","status":"publish","type":"post","link":"https:\/\/fieldtrust.be\/nl\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography","title":{"rendered":"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"10426\" class=\"elementor elementor-10426\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-208b677c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"208b677c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c6fa1dd\" data-id=\"6c6fa1dd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-190a4702 elementor-widget elementor-widget-text-editor\" data-id=\"190a4702\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.keepersecurity.com\/enterprise.html\">Keeper\u2019s Enterprise Password Manager<\/a> is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available.<\/p><p>ECC is a public-key cryptography method based on the mathematics of elliptic curves. <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/elliptical-curve-cryptography\" target=\"_blank\" rel=\"noreferrer noopener\">First proposed in 1985<\/a>, it recently rose to prominence with modern cryptography as it provides a higher level of security compared to traditional encryption methods, such as RSA.<\/p><p>Considered by the InfoSec community to be the most secure level of encryption for information security, ECC provides many advantages including:<\/p><ol><li><strong>Best-in-Class Security<\/strong>: The difficulty of solving elliptic curves provides an added level of protection against complex cyberattacks such as quantum computing.\u00a0<\/li><\/ol><ol start=\"2\"><li><strong>Efficiency<\/strong>: ECC uses smaller key sizes compared to other encryption algorithms, such as RSA. This makes it more efficient in terms of computation and storage requirements as it uses limited resources.<\/li><\/ol><ol start=\"3\"><li><strong>Fast Computation<\/strong>: ECC is faster than other encryption algorithms, making it an ideal choice for applications that require fast encryption and decryption.<\/li><\/ol><p>Keeper\u2019s <a href=\"https:\/\/docs.keeper.io\/enterprise-guide\/keeper-encryption-model#how-long-does-it-take-to-brute-force-an-aes-128b-or-256b-key\">encryption model documentation<\/a> compares the strength of 256-bit elliptic curves against vaults encrypted with password-derived keys.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1082a8e6 elementor-widget elementor-widget-heading\" data-id=\"1082a8e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">No Master Password Needed<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b082dc5 elementor-widget elementor-widget-text-editor\" data-id=\"5b082dc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The deployment of Keeper through a Single Sign-On (SSO) identity provider eliminates the need for a master password. Instead, Keeper uses ECC to encrypt and decrypt data, allowing for a seamless login experience with SSO and passwordless technology.\u00a0<\/p><p>A local ECC-256 (secp256r1) private key is used to decrypt the Data Key at the device level, which unwraps the individual folder keys and record keys for the latter to decrypt each of the stored record contents.<\/p><p>The Encrypted Data Key is then transmitted between the devices through a push system or key exchange service called <a href=\"https:\/\/docs.keeper.io\/sso-connect-cloud\/device-approvals\">Device Approval<\/a>, which is managed by the admin to preserve zero knowledge.<\/p><p>Without a master password to prey on, the threat of <a href=\"https:\/\/www.keepersecurity.com\/threats\/brute-force-attack.html\">brute force attacks<\/a> against stored data is eliminated.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5c764f21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c764f21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7d5aaa33\" data-id=\"7d5aaa33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb592de elementor-widget elementor-widget-heading\" data-id=\"fb592de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Keeper Complements SSO to Cover Any Security Gaps<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-569ff60a elementor-widget elementor-widget-text-editor\" data-id=\"569ff60a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>SSO\u2019s ease-of-use and ease-of-access have made it a preferred solution to remedy password-related issues, but it still presents serious security gaps <a href=\"https:\/\/www.keepersecurity.com\/solutions\/single-sign-on.html\">as a single point of failure<\/a>.\u00a0<\/p><p>For instance, users automatically get locked out of multiple sites and apps versus only one if they forget their password. Should a user\u2019s account get hacked, cybercriminals would be able to gain access to all associated sites and apps, compromising the entire layer of security SSO was tasked with providing in the first place.<\/p><p>Even with SSO, privileged access users still need one secure location to safely store non-SSO passwords, SSH keys, API keys, etc. that \u2013 just like SSO assets \u2013 require role-based access, configurable control of policies and sharing capabilities.<\/p><p><a href=\"https:\/\/www.keepersecurity.com\/resources\/how-keeper-completes-single-sign-on.html\">Keeper integrates with all major SSO solutions<\/a> and is a perfect complement for the legacy applications and other use cases that SSO doesn\u2019t cover. IT Admins and IT Security professionals love using Keeper for its:\u00a0<\/p><ul><li><strong>Rapid Deployment<\/strong>: No upfront equipment or installation costs. Easy Active Directory and SSO integration.<\/li><li><strong>Ultimate Cybersecurity Protection<\/strong>: Zero-knowledge architecture means there is nothing to hack.<\/li><li><strong>Pervasive Employee Adoption<\/strong>: Intuitive UI, automated password generation and autofill makes the transition a breeze.<\/li><li><strong>Mitigate Password-Related Support<\/strong>: No more forgotten or lost passwords.<\/li><\/ul><p><a href=\"https:\/\/fieldtrust.be\/nl\/contact\/\">Request a demo<\/a> of Keeper Enterprise Password Manager today to see how an elliptic curve level encryption can protect your organization\u2019s passwords, credentials and secrets with zero-trust and zero-knowledge security.<\/p><p>Source : Keepersecurity.com<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Keeper\u2019s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"1":"post","5":"has-post-thumbnail"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography &#8211; Fieldtrust<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography &#8211; Fieldtrust\" \/>\n<meta property=\"og:description\" content=\"Keeper\u2019s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fieldtrust.be\/nl\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Fieldtrust\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T21:47:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-27T21:56:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"646\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"fieldtrust_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:site\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fieldtrust_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography\"},\"author\":{\"name\":\"fieldtrust_admin\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\"},\"headline\":\"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography\",\"datePublished\":\"2023-04-27T21:47:28+00:00\",\"dateModified\":\"2023-04-27T21:56:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography\"},\"wordCount\":566,\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography\",\"name\":\"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography &#8211; Fieldtrust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper.jpg\",\"datePublished\":\"2023-04-27T21:47:28+00:00\",\"dateModified\":\"2023-04-27T21:56:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper.jpg\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper.jpg\",\"width\":646,\"height\":220},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fieldtrust.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"name\":\"Fieldtrust\",\"description\":\"The Value-Added Distributor for MSPs\",\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fieldtrust.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\",\"name\":\"Fieldtrust\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"width\":1,\"height\":1,\"caption\":\"Fieldtrust\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/fieldtrustbnl\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/fieldtrust\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCchBwXtTmebI8KkdOGrcC5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\",\"name\":\"fieldtrust_admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography &#8211; Fieldtrust","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"nl_NL","og_type":"article","og_title":"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography &#8211; Fieldtrust","og_description":"Keeper\u2019s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a [&hellip;]","og_url":"https:\/\/fieldtrust.be\/nl\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography\/","og_site_name":"Fieldtrust","article_published_time":"2023-04-27T21:47:28+00:00","article_modified_time":"2023-04-27T21:56:04+00:00","og_image":[{"width":646,"height":220,"url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper.jpg","type":"image\/jpeg"}],"author":"fieldtrust_admin","twitter_card":"summary_large_image","twitter_creator":"@fieldtrustbnl","twitter_site":"@fieldtrustbnl","twitter_misc":{"Geschreven door":"fieldtrust_admin","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#article","isPartOf":{"@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography"},"author":{"name":"fieldtrust_admin","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd"},"headline":"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography","datePublished":"2023-04-27T21:47:28+00:00","dateModified":"2023-04-27T21:56:04+00:00","mainEntityOfPage":{"@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography"},"wordCount":566,"publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"image":{"@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper.jpg","articleSection":["Uncategorized"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography","url":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography","name":"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography &#8211; Fieldtrust","isPartOf":{"@id":"https:\/\/fieldtrust.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage"},"image":{"@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper.jpg","datePublished":"2023-04-27T21:47:28+00:00","dateModified":"2023-04-27T21:56:04+00:00","breadcrumb":{"@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#primaryimage","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper.jpg","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper.jpg","width":646,"height":220},{"@type":"BreadcrumbList","@id":"https:\/\/fieldtrust.be\/keeper-the-only-enterprise-password-manager-to-use-elliptic-curve-cryptography#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fieldtrust.be\/"},{"@type":"ListItem","position":2,"name":"Keeper \u2013 The Only Enterprise Password Manager to Use Elliptic Curve Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/fieldtrust.be\/#website","url":"https:\/\/fieldtrust.be\/","name":"Fieldtrust","description":"The Value-Added Distributor for MSPs","publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fieldtrust.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/fieldtrust.be\/#organization","name":"Fieldtrust","url":"https:\/\/fieldtrust.be\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","width":1,"height":1,"caption":"Fieldtrust"},"image":{"@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/fieldtrustbnl","https:\/\/www.linkedin.com\/company\/fieldtrust\/","https:\/\/www.youtube.com\/channel\/UCchBwXtTmebI8KkdOGrcC5w"]},{"@type":"Person","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd","name":"fieldtrust_admin"}]}},"_links":{"self":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/10426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/comments?post=10426"}],"version-history":[{"count":10,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/10426\/revisions"}],"predecessor-version":[{"id":10449,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/10426\/revisions\/10449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/media\/10446"}],"wp:attachment":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/media?parent=10426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/categories?post=10426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/tags?post=10426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}