Security Support
Security-relevant fixes or other appropriate remediation measures for supported versions.
On this page you will find public information on supported versions, security updates, security contact and secure decommissioning of Password Depot.
This page applies to Password Depot, Password Depot Enterprise Server as well as associated clients, extensions and product-related services, insofar as they are provided or maintained by AceBIT.
It does not apply to custom developments, unreleased pre-release versions or customer-modified operating environments, unless expressly agreed otherwise.
For supported versions, we provide security-relevant fixes, update guidance and – where required – migration information.
Security-relevant fixes or other appropriate remediation measures for supported versions.
Bug fixes, compatibility updates and regular maintenance releases within the scope of the respective supported version.
After end of support, we generally no longer provide further security or maintenance updates for the affected version.
Information on version changes, end-of-support dates or required migrations is published in release notes, product information or provided on request.
We communicate security-relevant fixes via product information, release notes and – where a public security advisory is appropriate or required – additionally through our Security Advisories.
We transparently publish confirmed and resolved vulnerabilities through our Security Advisories.
View AdvisoriesFor the operation of Password Depot, we particularly recommend:
If you would like to report a security-relevant incident, a specific suspicion or a security-related issue in connection with your use of Password Depot, please use the following contact channels:
If you wish to decommission or replace an installation, the process should be planned and documented.
Determine which data, backups, logs and recovery information are still required.
Remove or archive local data stores, configuration files and export files in accordance with your internal policies.
Delete or secure credentials, service accounts, key material and certificates that are no longer needed.
For server or multi-user installations, connected services, background processes and technical dependencies should also be decommissioned in a controlled manner.
If you need product-specific guidance on decommissioning, our support team can assist within the scope of the available product documentation and your agreements.