Password Managers Didn’t Fix Passwords

Password Managers Didn't Fix Passwords

Table of Contents

Most companies now use a password manager. That much is true. Adoption rates have climbed steadily, and it is rare to find a security-conscious organization that has not deployed one. The assumption is simple: give people a vault, generate strong passwords, and the problem is solved.

It is not solved. Not even close.

Password managers addressed the most visible symptom of poor credential hygiene, which is weak and reused passwords. But in doing so, they quietly introduced a new set of risks that most buyers never evaluated. The failure did not disappear. It moved.

The myth: a vault fixes everything

The pitch from nearly every password security vendor sounds the same. Store your passwords in an encrypted vault. Auto-generate complex credentials. Share them securely with your team. Problem solved, right?

On paper, it looks clean. In practice, organizations that deploy a password manager and walk away tend to discover uncomfortable truths six to twelve months later. Credentials are still getting compromised. Former employees still have access to shared vaults. Entire departments are using tools that IT never approved. And the admin console that was supposed to give security teams visibility is either ignored or misconfigured.

The 2022 LastPass breach is the most high-profile example of what happens when the tool itself becomes the target. Attackers compromised a developer’s account, accessed source code and internal secrets, then used that foothold to reach cloud storage containing customer vault backups. The UK’s Information Commissioner’s Office fined LastPass £1.2 million for insufficient security protections, citing failures that exposed 1.6 million UK users. The lesson was not that password managers are inherently broken. The lesson was that centralizing credentials creates a high-value target, and the security of the tool matters as much as the security of the passwords inside it.

Where the failure actually lives

If you look at how credential breaches happen in organizations that already use a password manager, the same patterns show up repeatedly.

Shared vault access with no boundaries

Teams share vaults because it is convenient. Marketing shares social media logins. Finance shares banking credentials. But most organizations never set granular rules about who can see what. When everyone in a department can access every credential in a shared vault, one compromised account exposes the entire set. The vault did not eliminate the risk. It consolidated it.

Offboarding gaps

When someone leaves the company, IT disables their email and revokes SSO access. But what about the shared vaults they had access to? What about the credentials they copied to a personal device? Most password managers support user deprovisioning, but few organizations have a clean, automated offboarding workflow that covers every vault, every shared folder, and every credential that person touched. The gap between what the tool can do and what the organization actually does is where breaches live.

Shadow IT

Password managers only protect the credentials that are stored inside them. If a sales rep signs up for a new SaaS tool using a personal email and a weak password, the company vault never sees it. Shadow IT is a credential security problem as much as it is a procurement problem. The best password security tools now attempt to address this by detecting credentials outside the vault, but many organizations still have no visibility into the apps their employees are actually using.

Weak admin controls

A password manager without strong admin controls is a liability. If the admin console does not enforce password complexity, require multi-factor authentication, or provide audit logs, you are trusting individual employees to do the right thing. That has never worked at scale. The difference between a tool that stores passwords and a tool that actually improves your security posture comes down to what the admin can see, control, and enforce.

What to actually evaluate

If you are shopping for a password security tool, stop evaluating based on vault features alone. Every credible product stores passwords securely. That is table stakes. Instead, focus on the areas where most deployments fail.

Admin visibility and policy enforcement

Can you enforce password complexity rules across the entire organization? Can you require MFA for vault access? Can you see which employees have weak, reused, or compromised credentials? Look for a product that gives admins real control, not just a dashboard with vanity metrics.

Automated provisioning and deprovisioning

The tool should integrate with your identity provider, whether that is Azure AD, Okta, OneLogin, or something else. When someone joins, they should be automatically provisioned with the right vault access. When they leave, their access should be revoked instantly, including shared vaults. If you are still handling this manually, you have a gap.

Credential risk detection beyond the vault

Does the tool detect compromised credentials from external breaches? Does it flag employees who are using corporate emails to sign up for unauthorized services? The most useful password security tools now extend visibility beyond what is stored in the vault to what is happening across the organization.

Granular sharing and role-based access

Sharing should never be all-or-nothing. Look for tools that support role-based permissions, time-limited sharing, and the ability to restrict access at the individual credential level. The goal is to give people access to exactly what they need and nothing more.

Audit logging and compliance reporting

If you operate in a regulated industry, your password security tool needs to produce audit-ready reports. Who accessed what, when, and from which device. This is not optional for organizations dealing with HIPAA, SOC 2, GDPR, or similar frameworks.

Vendors worth evaluating

The Password Security Software category on Serchen lists the major players in this space. Here is how several of them address the real failure points outlined above.

1Password

1Password has become one of the most widely adopted business password managers, trusted by over 180,000 businesses. What sets it apart for security-conscious buyers is the depth of its admin controls. The Business plan ($7.99 per user per month) includes custom security policies, event reporting, advanced analytics, and integration with identity providers like Azure AD, OneLogin, and Okta. Admins can enforce MFA requirements, set password rules, and monitor compliance from a single console.

1Password also offers domain breach reports, which let admins find compromised credentials across the organization, even for employees who have not started using the vault yet. The Suspended Users policy automates cleanup by permanently deleting deprovisioned users after a set period, reducing the offboarding gap that plagues most deployments. For organizations dealing with shadow IT, the recently launched SaaS Manager provides visibility into unauthorized app usage and redundant licenses.

The Enterprise plan adds automated SCIM provisioning and custom onboarding, making it a strong fit for larger teams where manual user management is not practical.

Dashlane

Dashlane has evolved from a consumer password manager into an enterprise credential security platform. The Business plan ($8 per user per month) includes unlimited passwords, passkey support, group sharing, and a full Admin Console with customizable policies.

What makes Dashlane particularly relevant to the argument in this post is its newer Omnix platform ($11 per user per month), which goes beyond vault management. Omnix adds proactive credential risk detection, automated phishing alerts, and in-browser security warnings. It attempts to address the shadow IT problem by giving admins visibility into credential risks across all employees, whether or not those employees are actively using the vault. The platform also integrates with SSO and SCIM provisioning tools, supporting automated onboarding and offboarding workflows.

Dashlane has not suffered a major breach to date, which is a meaningful differentiator in a category where trust is everything.

NordPass

NordPass is built by Nord Security, the same company behind NordVPN. The Business plan starts at $3.59 per user per month, making it one of the more affordable options for teams that need solid admin controls without enterprise-level pricing.

The Security Dashboard gives admins a centralized view of password health across the organization, with breach detection alerts and policy compliance tracking. NordPass supports role-based access control, allowing organizations to restrict who can view or share specific credentials. The admin panel handles user provisioning, group management, and security policy enforcement.

NordPass uses XChaCha20 encryption, which is a more modern cipher than the AES-256 standard used by most competitors. Whether that matters in practice is debatable, but it signals a commitment to staying ahead of the technical curve. For mid-sized teams that want strong fundamentals without the price tag of 1Password or Dashlane, NordPass is worth a close look.

LastPass

LastPass remains one of the most recognized names in password management, and its Business plan ($7 per user per month) includes over 100 configurable security policies, directory integration, granular role-based permissions (user, helpdesk admin, admin, and super admin), and detailed reporting.

However, the 2022 breach and subsequent £1.2 million fine by the UK ICO cannot be ignored. LastPass has since implemented significant security upgrades: PBKDF2 iterations increased to 600,000, enhanced vault encryption, new cloud posture management, and a secure software factory with SBOM tracking. The question for buyers is whether these post-incident improvements are sufficient to rebuild trust. For organizations that prioritize the breadth of admin controls and policy options, LastPass still offers one of the most feature-rich consoles available. But the breach history means it faces a higher bar of scrutiny than competitors.

Trusona

Trusona takes a fundamentally different approach. Instead of managing passwords, it removes them entirely. Trusona provides enterprise-wide passwordless MFA using dynamic identity authentication, targeting the attack vectors that password managers cannot fully address: phishing, credential replay, keylogging, and SIM swapping.

Founded in 2015 and backed by Kleiner Perkins, Trusona serves Fortune 500 companies and government agencies. Its solutions integrate with platforms like ServiceNow, Zendesk, Jira, and Freshdesk. For organizations that are ready to move beyond passwords altogether, Trusona represents where the category is heading. It is not a direct replacement for a traditional password manager, but for high-security environments, it solves problems that vaults cannot.

The real checklist

Before you renew your current password manager or sign a new contract, ask these questions:

  • [ ] Can you see every weak, reused, or compromised credential in your organization right now?
  • [ ] When someone left the company last month, were all their shared vault accesses revoked automatically?
  • [ ] Do you know which SaaS tools your employees are using that IT never approved?
  • [ ] Are your admin policies actively enforced, or just configured and forgotten?
  • [ ] Can you produce an audit-ready report of credential access for the past 90 days?

If you answered no to more than one of these, your password manager is not doing its job. Or, more accurately, it is doing exactly what it was designed to do. The problem is that storing passwords was never the hard part.

Next steps

The Password Security Software category on Serchen is a good starting point for comparing the tools in this space. Look beyond the vault. Evaluate admin controls, offboarding automation, credential risk detection, and compliance reporting. Those are the areas where password security actually breaks down, and they should drive your buying decision.

Discover the best software tools for your business!



The Vacation Rental Arms Race
Vacation Rental Software

The Vacation Rental Arms Race

Ten years ago, renting out a vacation property meant posting a listing on Craigslist, fielding phone calls, and keeping a paper calendar on the fridge.

Read More »
Hedge Funds Run on Spreadsheets
Hedge Fund Software

Hedge Funds Run on Spreadsheets

There is a persistent belief in finance that the biggest, most sophisticated funds in the world must be running on equally sophisticated technology. Custom-built platforms.

Read More »