<img alt="" src="https://secure.hook6vein.com/218483.png" style="display:none;">

Rob Bellefeuille

Recent Posts

Pros and Cons of Cloud Authentication

Remember when clouds were just floating weather objects in the sky? It was not too long ago that this was the only thing people thought of when the word was mentioned; now it is a completely different story. Today everything is now in the cloud! Our information is floating on a cloud somewhere as we speak, but is it safe? Is it safer to have your information stored in the cloud or locally? To put...

Continue Reading →

Tags: Authentication, information security, SSO, Cloud Authentication, Dynamic Analysis, Two-Factor Authentication, User Authentication

Authentication Software Deployment Checklist - What to Know

 

 

Deploying a new solution in any environment poses a certain number of challenges. These challenges can stem from determining how to best execute the deployment, to overcoming user adoption rate issues. Today I will illustrate the key components of a software deployment checklist; and also provide insight on overcoming some common hurdles faced when staring down the barrel of that deployment...

Continue Reading →

Tags: Authentication, best practices, #deployment, Dynamic Analysis

Mac Keychain Password Recovery | The Challenges

 

 

As an IT professional working in a mixed Windows and Mac environment, it can sometimes feel like you are working for two separate IT departments. Like oil and water, most procedures and operational functions between the two do not mix. This requires you to always be cognizant of your end users when considering deploying different solutions and software. Although it may seem like a pain,...

Continue Reading →

Tags: identity management, #passwordmanagement, #passwords, SSPR, User Authentication, end-users

Data Protection Best Practices - 3 Easy Steps

 

 

Protecting your data is important. Can you imagine living in a house with no locks on the doors or windows? What about leaving your brand new car running unattended while you go in and grab a soda from the corner store? The analogies could go on forever and get much more ridiculous, so I’ll stop while I am ahead! Even though we know how important it is, we still tend to skate around the issue.

Continue Reading →

Tags: Authentication, best practices, contextual authentication, information security, #passwordmanagement, #passwords, PortalGuard, #securauth, Two-Factor Authentication, User Authentication

Who is behind the Keyboard: Contextual Authentication

 

 

Have you ever asked yourself this question before? The MTV TV show Catfish asks this question in every single episode. They work with people all over the United States that have fallen in love with someone they have never met in person, or even talked to on the phone before. On the show, the two hosts work together to find the person who is behind the other keyboard in order to play...

Continue Reading →

Tags: Authentication, best practices, contextual authentication, #cybersecurity, identity management, information security, #passwords, PortalGuard, #securauth, Two-Factor Authentication, User Authentication

Self-service Password Reset Solution Deployment

If your company is plagued by too many login prompts, forgotten passwords, and account unlocks, you are certainly not alone. These are problems that hound companies worldwide and have caused companies to allot funding for the appropriate solution. With the steady increase in the appearance of these problems, the need for an adequate response is almost oppressive. Finding a solid solution is only...

Continue Reading →

Tags: Authentication, best practices, identity management, information security, #passwordmanagement, #passwords, PortalGuard, SSPR, User Authentication

Usable Self-service Password Management

When you think of something to be self-service you expect it to be usable right? Otherwise it is an oxymoron really, I can’t think of anything that is an unusable self-service item unless it is broken. Managing passwords can be a fulltime job if there is no solution in place to handle the tasks surrounding it, including managing password quality and expiration. But perhaps we should look at the...

Continue Reading →

Tags: Authentication, identity management, information security, #passwordmanagement, PortalGuard, SSPR

Passwords, Applications, AHHH! What You Need is a Dose of SSO!

 

If you list “logging into multiple applications in a day” on your resume as a skill set, this is a sign that you may be dealing with too many applications and log in prompts. Countless login prompts can lead to multiple problems including using weak, easy to remember passwords that are fresh for the hacking. Sometimes, even account lockouts can occur due to forgotten passwords. Oh the agony...

Continue Reading →

Tags: Authentication, information security, PortalGuard, SSO, SAML, Single Sign-On

No More Logins! - Reducing multiple login prompts

 

How many applications is your company using at the moment? Three, four, ten? Chances are it is more than one, and with the vast number of applications available for businesses, there is a likelihood that the number of applications will grow as time goes on. With all of these applications comes login prompts for each application. This can result in many things, including password fatigue,...

Continue Reading →

Tags: Authentication, information security, #passwordmanagement, #passwords, PortalGuard, #securauth, SSO, SAML, Single Sign-On, User Authentication

Did You Know Single Sign on Can Do This?

I was sitting with my nephew a few weeks ago and discussing what I do for work, he is five and surprisingly very tech savvy. I was telling him about all the different solutions we offer for companies like Self-service Password Reset, Single Sign on, and Two-factor Authentication and he wanted to know more about each. Two-factor was a little too hard for him to wrap his brain around so we did not...

Continue Reading →

Tags: Authentication, information security, #passwordmanagement, #passwords, PortalGuard, SSO, Single Sign-On, SSPR, Two-Factor Authentication