by Christopher Perry 0 Comments

Sharepoint Password Expiration Example: Poor UI

 

SharePoint password expiration: that alone is often enough to make chills run down the back of a typical IT administrator. Regardless of the environment, SharePoint remains a popular choice for many organizations. Reasons vary, of course, but the fact remains that SharePoint shows up just about everywhere, even today. That’s not to say that everything with SharePoint is perfect: simply do a...

Continue Reading →

Tags: Authentication Methods, Identity Provider, User Experience, password expiration, Password Management, #SharePoint, User Authentication

by Michael Galinat 0 Comments

Offline Enhancements For Better Online Security

Are you a person that is constantly working on the move? Are you worried that your computer could be compromised by a cyber criminal who hacked your password?  If you answered "YES" to either of these questions, then we highly recommend installing our latest PortalGuard Desktop Client.

Continue Reading →

Tags: 2FA, Authentication Methods, authentication security, IT Security, login security, Two-Factor Authentication, offline, offline desktop 2fa

by Nancy Wolff Leary 0 Comments

Strengthening Authentication to Adapt to Changing Circumstances

Are you worried that your current IT projects are overly complicated, haven’t been tested sufficiently or may impact existing applications in a way that you have not considered?

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, #breach, Compliance, IT Security, #passwords, #security, #phishing, Two-Factor Authentication, secure passwords

by Gregg Browinski 0 Comments

How Can a Cloud Provider Securely Access my Active Directory?

More users and companies are running software applications in the cloud than ever before. When even the US Federal government is looking to get into the cloud, it's a clear indication that it has reached wide acceptance. Similarly, Identity as a Service (IDaaS) has been around for years, but how often do admins considering this approach bother to take a deeper dive into the issue of directory...

Continue Reading →

Tags: Authentication, Authentication Methods, Authentication Security, Cloud SaaS, encryption, firewall, Identity Federation, IT Security, #security, Access Control, Access Management, Active Directory, User Authentication, VPN, OAuth 2.0, OAauth, IDaaS, directory synchronization

by Jay Ouellette 0 Comments
by Eric Jeffers 0 Comments

Maintaining Security and Data Privacy is one of the Biggest IT Challenges Today

Every year at the EDUCAUSE Conference the Top 10 IT Issues for the upcoming year are announced. Leading up to each conference a panel of experts ranging from IT leaders, CIO’s and faculty members present a list of the top IT trends. which are then voted on by EDUCAUSE members. The top initiatives are the most important topics and trends and will be a focus for the upcoming year. This year was...

Continue Reading →

Tags: 2FA, Access Client, Account Unlock, attack surface reduction, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #breach, checklist, Compliance, #cyberattacks, #cybersecurity, Education, Education Portals, email, encryption, End user experience, expiration, help desk calls, higher education, #HIPAA, I.T. Solutions, Identity Federation, identity management, Increase ROI, increased usability, information security, #infosec, Integration, IT Security, it security, #ITSecurity, K-12, login security, MFA, Multi-Factor Authentication, National Institute of Standards and Technology, network security, password reset, security questions, Access Control, Access Management, Access Point, account management, Active Directory, Application Security Testing, Authentication Provider, #breachnews, customer experience, Cyber Security, data breach, data security, Easy to Maintain Solutions, OTP, password alternatives, password encryption, Self-Service Password Reset, Single Sign-On, Two-Factor Authentication, healthcare, Students, single logout, increase security, EDUCAUSE, budgeting for education, student accounts, maintain security privacy, maintain data privacy

by Gregg Browinski 0 Comments
by Christopher Perry 0 Comments

Ask Christopher - "Should I Upgrade?"

Upgrading is always a top priority in the software industry.  Keeping vital software running smoothly and without issues is imperative to any industry with a digital presence.   With an authentication package like PortalGuard, up-to-date software also brings along new features and fixes for existing bugs or hiccups discovered along the way.  With that in mind, I am not surprised at the most...

Continue Reading →

Tags: 2FA, Authentication, Authentication Methods, Authentication Security, authentication security, Centralized Authentication, #cybersecurity, MFA, Access Control, Access Management, Access Point, account management, Authentication Provider, Cyber Security, tech support, PortalGuard Authentication Provider, upgrades, PortalGuard Security Policy, PortalGuard Proxy, PortalGuard v6.2, Modern SSO Protocols, cybersecurity leaders, newest version, why upgrade

by Christopher Perry 0 Comments

Why Gamers Tolerate Two-Factor Authentication

Two-Factor Authentication is often a dirty phrase for end-users – though that does not seem to hold true within the gaming community. It is not a stretch of the truth to say that gamers are a temperamental lot.  We like things that work, and we hate change on principal.  Of course, opinions can shift one way or the other, but that’s the basic foundation when targeting gamers as an audience:...

Continue Reading →

Tags: 2FA, #AccountUnlock, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #gamer, MFA, Microsoft, Multi-Factor Authentication, Access Management, Authentication Provider, OTP Authentication, Two-Factor Authentication, User Authentication, mobile authentication, mobile authenticator, blizzard, Square-Enix, Steam, XBOX, PC Games, Benefits of 2FA, Sony, PlayStation, gaming companies using 2FA

by Jay Ouellette 0 Comments