by Gregg Browinski 0 Comments

How Can a Cloud Provider Securely Access my Active Directory?

More users and companies are running software applications in the cloud than ever before. When even the US Federal government is looking to get into the cloud, it's a clear indication that it has reached wide acceptance. Similarly, Identity as a Service (IDaaS) has been around for years, but how often do admins considering this approach bother to take a deeper dive into the issue of directory...

Continue Reading →

Tags: Authentication, Authentication Methods, Authentication Security, Cloud SaaS, encryption, firewall, Identity Federation, IT Security, #security, Access Control, Access Management, Active Directory, User Authentication, VPN, OAuth 2.0, OAauth, IDaaS, directory synchronization

PortalGuard's Latest in Feature Updates - Summer 2019

There is never a shortage of feature and enhancement requests from our customer base. These have been critical to ensuring PortalGuard's relevance in the authentication space so keep them coming! Features that make it into PortalGuard are either directly funded by a customer through our Tailored Authentication program or they are requested by multiple customers. For the latter case, these...

Continue Reading →

Tags: Authentication Security, End user experience, MFA, Multi-Factor Authentication, PortalGuard, Access Control, Access Management, Active Directory, PortalGuard Configuration, PortalGuard for Education, PortalGuard Update, SOL-based directory, two-factor, Two-Factor Authentication, secure login, security risk, login session, mobile authentication, Biometrics, front-end login, voice biometrics, domain policy, fingerprint readers, enable 2fa, security compliance, features, voice recognition, tailored authentication, automatic delivery fallback/failover, web-key, bio-key

by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

by Gregg Browinski 0 Comments
by Christopher Perry 0 Comments

Ask Christopher - "Should I Upgrade?"

Upgrading is always a top priority in the software industry.  Keeping vital software running smoothly and without issues is imperative to any industry with a digital presence.   With an authentication package like PortalGuard, up-to-date software also brings along new features and fixes for existing bugs or hiccups discovered along the way.  With that in mind, I am not surprised at the most...

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, authentication security, Centralized Authentication, #cybersecurity, MFA, Access Control, Access Management, Access Point, account management, Authentication Provider, Cyber Security, tech support, PortalGuard Authentication Provider, upgrades, PortalGuard Security Policy, PortalGuard Proxy, PortalGuard v6.2, Modern SSO Protocols, cybersecurity leaders, newest version, why upgrade

by Christopher Perry 0 Comments

What to do When You Don't Always Need Two-Factor Authentication

 

Two-Factor Authentication (2FA) is an important topic of discussion where security is of concern. Too many data breaches have occurred over the last 10 years purely because of lackadaisical security requirements. Many of these events would have been avoided with a proper Two-Factor Authentication system in place.  Security: personal, private, corporate – the list goes on and on. Each entry a...

Continue Reading →

Tags: 2FA, #2FASolutions, contextual authentication, #contextualauthentication, #passwordmanagement, #security, security questions, #securityandusability, #selfservice, usability, User Experience, #2FA, #2ndfactor, Access Control, Access Management, account management, Password Synchronization, secure authentication, two-factor, Two-Factor Authentication, security trends, geolocation, layer of security, mobile authentication, mobile authenticator, Benefits of 2FA, one click, when you don't need 2FA

by Christopher Perry 0 Comments

Why Gamers Tolerate Two-Factor Authentication

Two-Factor Authentication is often a dirty phrase for end-users – though that does not seem to hold true within the gaming community. It is not a stretch of the truth to say that gamers are a temperamental lot.  We like things that work, and we hate change on principal.  Of course, opinions can shift one way or the other, but that’s the basic foundation when targeting gamers as an audience:...

Continue Reading →

Tags: 2FA, #AccountUnlock, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #gamer, MFA, Microsoft, Multi-Factor Authentication, Access Management, Authentication Provider, OTP Authentication, Two-Factor Authentication, User Authentication, mobile authentication, mobile authenticator, blizzard, Square-Enix, Steam, XBOX, PC Games, Benefits of 2FA, Sony, PlayStation, gaming companies using 2FA

by Jay Ouellette 0 Comments
by Christopher Perry 0 Comments

Top 5 Reasons to Use a Mobile Authenticator

The advent of modern authentication security places a lot of pressure on the user to remain secure in a constantly changing environment.  Using a Mobile Authenticator is one of the most simple and accessible methods to remain secure without compromising usability.  We discuss what makes a good Mobile Authenticator in our recent White Paper - The Argument for a Better Authenticator. However,...

Continue Reading →

Tags: 2FA, #2FASolutions, authentication security, #cybersecurity, MFA, mobile security, Multi-Factor Authentication, #2FA, Access Management, Active Directory, Cyber Security, OTP, OTP Authentication, Single Sign-On (SSO), SSPR, user convenience, Single Sign-On Options, flexibility, OTP Methods, mobile authentication, HOTP, cyber aware, mobile authenticator, accessibility, Simplicity