Here at PortalGuard, we’re always looking to the future. Whatever the next way is for us to improve our products, our culture, ourselves, and the lives of our customers, we’re there. In one of the fastest moving and constantly evolving industries, we take pride in staying ahead of the cutting edge. We are committed to leveraging new technologies in new ways so that we can continue to meet the...Continue Reading →
A popular question these days is this: what exactly are the benefits of a cloud computing environment? The question of Cloud versus On-Premises can be looked at through a myriad of lenses. Does it pit convenience versus control? Simple vs. complex? Paper or plastic??? A decision may derive from an organization’s availability of resources and skill sets. If the organization has the expertise to...Continue Reading →
So, what is cloud computing in simple terms? I mean, it’s no secret, the cloud is a big deal - a very big one - and has been increasingly so, literally and figuratively, for the greater half of the decade. If your job so much as grazes the tech industry, you’ve likely heard the words cloud or cloud computing spoken to a near nauseating degree in such a way that it sounds like the best thing...Continue Reading →
Do you see IT infrastructure as a necessary evil? What about IT infrastructure when it comes to e-mail hosting? Did your answer between those two questions waver or change at all? As a service, email has been “business critical” for years now, making it a necessary staple to any environment. In many cases, this may lead to oversight when understanding the Total Cost of Ownership represented by...Continue Reading →
In my last blog post I talked in great detail about the way in which organizations need to evaluate and understand the true Total Cost of Services (TCS) when evaluating potential cloud solutions. Once you have a handle on the numbers and the potential impact to your organization's bottom line, putting together a business case for the potential benefits of SaaS becomes relatively...Continue Reading →
There comes a time in the tenure of every IT Warrior where they must take a long look in the mirror and make a tough choice for the betterment of the realm. You hear whispers on the winds of a company of sorcerers devoted to kingdom security – and providing SaaS SSO.
You have fought countless battles in defense of your castle walls. Endless waves of your enemies have crashed against the...Continue Reading →
What is ‘The Cloud?’ As far as buzzwords go, this is a particularly popular one. Ever since software giants such as Google and Microsoft began illustrating just how popular web-based applications can be, more and more software companies have taken to the cloud to reach a wider audience and keep up with the expectations of their end users. Software as a service is a relatively old idea, but...Continue Reading →
Securing Network Infrastructure with User Convenience
So many network breaches to read about, so little time. The scary thing is that these headline grabbers are generally global, well-known companies that you would expect to have a secure network infrastructure. As an IT professional or director, you would hope that since this type of company is a larger target, they would have a...Continue Reading →
Tags: innovative two factor authentication, IT Security, PortalGuard, SaaS, OTP, PassiveKey, Password Security, secure network infrastructure, Two-Factor Authentication, User Authentication, user convenience, web applications
When you first read this, you may be scratching your head and wondering how that is even possible? Well my friend, it is possible and is becoming quite popular even!
Now this concept may be way out of left field for you, but the process is simple and surprisingly secure.
For years, costly hard tokens have been the standard for providing 2nd factor authentication. This not only was costly...Continue Reading →
How to successfully pair two different 2FA solutions on one server
Stronger authentication is a much needed security measure in modern cyberspace. This protection is there to thwart away unwanted evils from breaking into your system to disrupt or steal your data. A good anti-virus software and firewall will protect your information to a point, but incorporating two-factor authentication is...Continue Reading →