by Michael Barry 0 Comments

Getting Support for Your Hybrid Environment from an IDaaS Solution

While there are key benefits to moving to a cloud-based IAM solution, not all of them are created equal when it comes to their support for various applications and environments. Although the great “cloud migration” is underway, your environment is probably like many organizations – a hybrid. A mix of cloud, on-prem and even “legacy” applications are still in use. With many IDaaS solutions solely...

Continue Reading →

Tags: hybrid, PortalGuard, total cost of ownership, Cloud Authentication, User Authentication, flexibility, IAM, cost-effective, IDaaS, identity management software, identity and access management, Cloud IAM, Article, Article - Resource Center

by Michael Lowe 0 Comments

How Your Cybersecurity Budget May Be Suffering from Your IAM Solution

The pressure to find or update your IAM solutions is at an all-time high. 

But when faced with this pressure, you may be choosing an IAM solution that delivers unexpected costs in overhead and licensing fees.

According to Gartner, Inc., by not looking at alternative or even open-source options you could be missing out on as high as 25% savings in your IAM budget.

When rushing to find an...

Continue Reading →

Tags: PortalGuard, total cost of ownership, Cloud Authentication, User Authentication, flexibility, IAM, cost-effective, IDaaS, identity management software, identity and access management, Cloud IAM, Article, Article - Resource Center

by Jay Ouellette 0 Comments

Passwordless Authentication Methods for Account Access

Just a short time ago everyone was starting to talk about passwords diminishing from existence. New forms of proving an individual’s identity are getting better and better each month and the FIDO Alliance deserves all the recognition for making it possible. The FIDO Alliance is focused on making authentication secure for consumers without using common OTP methods. Passwordless authentication...

Continue Reading →

Tags: 2FA, Authentication Security, MFA, Multi-Factor Authentication, #YubiKey, Duo Push Security, password habits, secure passwords, security risk, FIDO, FIDO Alliance, VoiceIt, Biometrics, vendor integrations, Benefits of 2FA, multilayer encryption, fingerprint readers, enable 2fa, security compliance, user profiles, end-users, cost-effective, password requirements, usual password, brute-force attacks, voice recognition, tailored authentication, web-key, bio-key

Ask Christopher - Why should I use the SQL Back-End with my PortalGuard implementation?

Knowing where to store user data is tough.  Many variables must be considered before making a final decision, and the choice itself is never easy.  PPortalGuard offers two different options for storing user-specific data: the file system and an SQL backend.  While the initial choice may be daunting, it really is a no-brainer when you think about it.

For many administrators, implementing an...

Continue Reading →

Tags: CAS, PortalGuard, SQL, User Experience, data security, Single Sign-On, Ask Christopher, empower users, CAS SSO, compliances, administrator, online security, improve security, security compliance, SQL Monitoring Utility Tool, user profiles, features, user data, user-specific data, end-users, data compliance, NIST, web-utility, contextual Two-Factor Authentication, load balanced environments, cost-effective, reporting

by Eric Jeffers 0 Comments