Protect your digital keys
Thanks to its decentralized technology, MyCena gives each user a three-tiered password fortress that only they can access
View demo
MyCena Dashboard
What is your CSL?

Use the Credentials Security Level (CSL) assessment tool to discover your recommended level

Discover your CSL

No Human Progress
without Security

Security is a basic human need. Without it, progress made over centuries can been wiped out in years. Given technological advances, it can now happen in months. As organizations have traded keys for passwords to protect their front doors, passwords are now responsible for over 80% of data breaches. To stay safe online, password protection is no longer an option.

No Human Progress without Security
Exposed by passwords

Today, 81% of data breaches start with weak, stolen and reused passwords. Passwords are like keys. If stolen, hackers can enter your house without notice. With 3 billion stolen credentials on sale online and 90% login attempts done by bots, credential stuffing has led to a gold rush with high levels of return for hackers.

Humans struggle with passwords

Due to high profile data breaches, companies are aware they should not use passwords like 123456 or admin, nor reuse passwords or variations. But no matter how hard they try, people cannot remember dozens of strong and unique passwords. Technology can help but beware as not all solutions are created equal.

No Human Progress without Security
Total Password Security

Total Password Security

The risks of centralized passwords

Many technologies now offer cloud password management with single sign-on, letting people manage all passwords with a master password and store them on the cloud. Unfortunately, that plainly creates central points of vulnerability, which become attractive for hackers.

  • First, by putting all your eggs in the same basket with other people, you help create a ‘honey pot’ for hackers.
  • Second, by using just one master password, you essentially use one padlock which a hacker can crack with the same methods used for any password (social engineering, credential stuffing, password spraying, etc.) but this time to get all the other passwords at once.
  • Third, just like robbers target hotel managers to get the master key that opens all the guest rooms, hackers can target top executives’ master password to open all the keys to the “kingdom”.

You make it easy for the hackers! To get total password security, you have to remove central targets.

Decentralize passwords

Your passwords are your digital keys. And just like your physical keys, you want to keep locally with you, not with someone in the cloud. Access should be fast, safe and convenient at all times.

After years of research , we managed to find a way to decentralize passwords. Our highly scalable solution brings password convenience and security to all organizations, using our patent-pending Method for Access for Structured Stored Data (MASS Data).

MyCena’s main differences (and strengths) are:

  • Not on the cloud - Passwords Encrypted and Stored Locally
    Instead of storing passwords on the cloud, passwords are encrypted and saved under three levels of security locally on the device. Now, if hackers want to get your passwords, they will first need to get into your pocket!
  • No Master Password
    Hackers can’t just crack one master password in order to get all the other ones. If they have the device, they would have to break through three ultra-secure levels, each with a different mode of security.
  • Three Levels of Password Security
    MyCena offers three levels of protection for passwords, depending on their sensitivity. Generally, we recommend putting low sensitivity passwords like newsletters in Bronze level, medium sensitivity passwords like social media in Silver level, and high sensitivity passwords like banking in Gold level. To access the different levels, each user needs a combination of finger print, face ID or PIN for Bronze, lock pattern for Silver and voice passphrase for Gold.
No Human Progress without Security

Fast, Easy and Mobile

People want convenience. That’s why they still use 123456 and not %Lr039sT#&WKdr as their password! With MyCena there is no need to choose between convenience and security. In fact, we have built a range of features to make your life even easier while protecting your passwords.

Strong Password Generator

Credentials harvesting, credential stuffing, password spraying, social engineering and phishing happen every second. With 3 billion stolen usernames and passwords for sale online, your security depends on strong passwords more than ever. To help you protect every single front door of your business with a strong and virtually unbreakable password, MyCena generates passwords in a way so that you never have to wonder if your password is strong enough.

Fast, Easy and Mobile
Never Type a Password

Our web extension lets you safely copy and paste passwords across devices in a few clicks. You don’t need to see the passwords as they stay encrypted, making them less vulnerable to theft. You also don’t need to type them which eliminates the pain of a typing mistake.

Safe Passwords Sharing

Passwords sometimes need to be shared with colleagues. The “Receive shared passwords” feature makes it safe and seamless.

Travel Mode

When you are away from your home or desk, losing passwords can become your worst nightmare. With Travel mode activated, in the event of device loss or theft, you can get a new device and re-upload your passwords easily.

Multi-platform, Multi-device

People often need multiple devices nowadays, including mobile phones and tablets. MyCena works on all mobile devices and tablets running off iOS as well as Android.

Encrypted Synchronisation and Backups

MyCena offers encrypted synchronization across all your devices and encrypted backups (just like a backup of your house keys) which you can save anywhere you like, although we’d recommend not saving on the same device, in case it gets lost.

Easy Search Interface

Having hundreds of keys will make you safer because a hacker cannot use one key to open all the other doors in your company. But how will you find the right key to use when you have hundreds of keys in your pocket? MyCena has a nice and simple visual interface that allows you to search for the right key. Check out our Solutions to learn more.


Because the number of people in your organisation may fluctuate, you can opt for an annual or monthly plan. You have the flexibility to increase or decrease the number of ‘seats’ as needed.

No Human Progress without Security
Password Protection in Minutes

Password Protection
in Minutes

You can relieve your organization from its biggest security headache in minutes. As a complete password security solution, MyCena requires no change to your current system. In fact, from onboarding to monitoring, MyCena makes password protection painless.

Easy Setup and Onboarding

Minimizing the number of steps for employees to secure company passwords, the manager can enroll the entire workforce in minutes. MyCena then takes care of sending easy to follow instructions to everyone.

Easy Monitoring

Our MyCena Manager dashboard helps managers easily monitor password compliance without seeing employees’ passwords. Managers can also set rules including minimum password length required, frequency of backup and frequency of password change.

Password Protection in Minutes

Don’t Wait to be

Last year there was a 420% increase in cyber breaches; 94% of businesses have reported phishing attacks while 60% of businesses shut down within six months of a data breach. Public companies have shut down because of breaches and information theft. Political leaders have lost elections because of password theft and email breaches. More than ever, survival and success depends on staying secure online.

Is Your Front Door Protected?
Are people in your company:
Don’t Wait to be Breached!
  • Reusing passwords?
  • Using common weak passwords that have been leaked?
  • Using variations of the same password?
  • Sharing passwords on non-secure channels?
  • Using easy-to-remember passwords like names, towns, birthdays, sports teams, etc.?
  • Using passwords that are easy to guess through social engineering by human hackers or bots?

If you have answered “yes” to any of the above questions, then you are at risk of becoming the next victim of a cybersecurity breach.

Best Password Practices

There is only one way to decrease your company exposure to password risks: use strong unique passwords for each account:

  • Passwords should be minimum 12 characters
  • Passwords should mix upper and lower-case letters, numbers and special characters
  • Passwords should be completely unique and unrelated to each other

Beware of a ‘False Sense of Security’

Most organizations are not doing enough to safeguard their passwords. In recent years, password security represented roughly 0.5% of all cybersecurity spending. That is a disproportionately low percentage when you compare it with the 81% of breaches that start with passwords. Most cybersecurity strategies today are out of sync with reality.

It is dangerous for organizations to rest on vulnerable systems that offer a false sense of security while also exposing them to higher risks – such as using a central passwords vault to store passwords on the cloud and relying on a master password, which can be “guessed” through social engineering or credential stuffing.

  • Two-factor Authentication (2FA)
    We will always recommend two-factor authentication whenever possible. But when a password is weak, you are really down to one-factor. Unfortunately, SMS interception and SIM swaps have become so prevalent that less vigilant companies end up solely relying on 2FA for their protection, and are at an increased risk of getting hacked, as a result.
  • Detecting Anomalies
    While companies have relied on detection systems and alarms to notify them of breaches, many have failed to prevent their front door from getting breached. Putting thousands of sentinels around your house won’t prevent hackers from entering through your door. In the world of cybersecurity, prevention is better than cure.
  • Password Managers
    Password managers can be deceiving because they make you rely on a single master password to sign-in. If the master password is hacked or “guessed” through social engineering or credential stuffing, you lose everything at once. Cloud password managers also store passwords in central servers, which become highly prized honey pots. In all logical scenarios, single points of vulnerability should be avoided.
Don’t Wait to be Breached!
Passwords will stay

Passwords will stay

Password have existed throughout centuries – think “Open Sesame”. Because they are economical, changeable and sharable, they are the easiest and safest way to give access to the person with the “key”.
Some critics have called for the death of passwords because people simply cannot remember hundreds of unique and strong passwords. We say they were pointing fingers at the wrong problem. The problem was never the password itself, but the limitations of the human memory.

Understand your Memory

Our short-term memory is limited and should be used wisely. According to neuroscientists, it is less important for our brain to remember where our keys are than to remember a typical place where to leave our keys. In short, our brain was never designed to remember strong unique passwords, it just needs to know where they are.

Free up your Memory with MyCena

With MyCena you have access to an unlimited number of strong and unique passwords, keeping all your data safe and secure. Removing the need to remember passwords means you can free up your memory space to work, think and create.

Why “Password-less” is dangerous

Password critics have called for the use of identity as passwords. They call it “password-less”. In fact, it is nothing more than using your digitized identity as a password. But if your identity (fingerprint, voice, face or retina…) gets stolen – which happened and will happen again, contrary to a password, you cannot change it.

Passwords will stay

Who needs MyCena?

As long as you are operating online, there is no place to hide. It’s as simple as that. Furthermore, in the context of cyber-espionage and IP theft, all sectors are affected: Government, Military, Police, Telecommunications, Security, Finance, Insurance, Banking, Infrastructure, Utilities, Transportation, Healthcare, Manufacturing, Publishing, News, Travels, Legal, Retail, Supply Chain, Non-profit, IT, IoT, E-commerce, etc. Not only are organizations directly targeted, but hackers are now attacking them indirectly through their supply chain.

How Big is Your Password Exposure?

Nowadays, passwords are used in all organizations. They are the end points through which people access the right information and tools they need to do their job. As such, they present the largest ‘surface of attack’ for hackers.

Some companies rely on centralized solutions like Active Directory. But as with cloud password managers, centralizing all password access points increases the risk at a single ‘point of failure’.

With 3 billion passwords for sale online, weak and ‘breachable’ passwords represent a serious risk companies can no longer afford to take.

Cover Your Biggest Surface of Attack

In just a few years, companies’ surface of attack has expanded from business systems and infrastructures to the entire workforce – from junior employers to chief executives or anyone in the company who is online. In the meantime, people have not changed how they use passwords:

  • Over 50% rely on just memory
  • 32% save them in a web browser
  • 26% save them on a spreadsheet, and;
  • 26% write them down.

With the number of passwords reaching the hundreds, it is unsurprising to know that hackers have moved their main point of attack to passwords. Now, 81% of data breaches start with weak, stolen or reused passwords.

The statistics speak for themselves. A government report revealed that nearly 45% of UK businesses have experienced a cyberattack in the last 12 months, with all sectors and companies of all sizes being targeted. No one is safe.

Before it is too late

Through a ripple effect, entire communities and supply chains are at risk when there is a data breach.

Stolen personal data on employees, customers and suppliers exposes not just them but also their networks. Contrary to the brick and mortar age, a breach in the digital age has far reaching consequences. Take, for example, the data breach at Equifax which immediately affected 143 million people around the world.

Unfortunately, most businesses don’t even realize that they have had a cybersecurity breach – with 93% not discovering data breaches for several weeks. And, in a span of just a few weeks, a huge amount of damage can be done to a business. Hackers can install malware on employees’ workstations in order to extract highly sensitive information from a company’s network before they even realize that their security has been compromised. High profile examples include Nortel which eventually collapsed in 2009, and Citrix who had gotten hacked six months prior to being officially alerted by the FBI.

And the risk of password breaches continues to mount. After 2018 being the worst year in cyber security breaches, 2019 started with the largest username and password leaks ever documented in history with the publication of “Collection #1” then “Collections #2-5”. And, more credentials get added on a daily basis on hacking sites, making the success rate of credential stuffing hackers soar higher by the day.

Join Our Best-in-Class Partner Program

A staggering 60% of small businesses have shut down completely within 6 months of being compromised by a cyberattack. To be able to serve businesses of different sizes and across different sectors with the ultimate password protection, we have launched our Global Partner Program.

Main Benefits of MyCena for Your Customers

Main Benefits of the Global Partner Program

Our best-in class global program puts our partners at the heart of our company strategy, driving renewed growth and value for their ecosystem, while helping their customers protect themselves online.

Through MyCena’s global reach, our partners contribute to put an end to compromised security due to weak passwords once and for all – empowering companies to keep their passwords protected all year round.

MyCena is the most complete enterprise password solution available today. Our highly scalable solution brings the convenience of mobile safety and access that organizations demand.

Join MyCena Partner Program
Main Benefits of MyCena for Your Customers
  • Everyone keeps their own passwords like their keys.
  • Users are not exposed by a master password.
  • Only the user can see their passwords by accessing their three levels of security.
  • No need to type passwords, just copy and paste from MyCena to the account password field.
  • If they lose their device, a thief cannot access their passwords, while they can just download MyCena on a new device and reload a copy of their passwords.
  • No long do you have to put all passwords in the same place. Keep the least sensitive passwords in Bronze, medium sensitivity passwords in Silver and the most sensitive ones in Gold level.
  • Contain the damage of a data breach from spreading to other accounts.
Help Customers Take Back Control of their Passwords

MyCena offers the most secure and complete enterprise password solution:

  • Decentralized – Passwords are kept on the user’s device and not on the cloud; there is no honey pot keeping all company passwords in the same place; critical authentication biometrics are also kept locally on users’ devices and not on the cloud, so they cannot be breached.
  • Distributed – Everyone keeps their passwords locally, passwords split into three different levels; keep the most sensitive passwords in deeper levels.
  • No master password required – Combine three methods of authentication
  • Encrypted – Unique encryption key for every user account
  • Monitored – Set password rules and verify compliance
  • Strong password generator – Do away with people creating weak, common and predictable passwords or password variations

Subscribe to newsletter

Receive our cybersecurity digest directly in your mailbox