by Michael Barry 0 Comments

Getting Support for Your Hybrid Environment from an IDaaS Solution

While there are key benefits to moving to a cloud-based IAM solution, not all of them are created equal when it comes to their support for various applications and environments. Although the great “cloud migration” is underway, your environment is probably like many organizations – a hybrid. A mix of cloud, on-prem and even “legacy” applications are still in use. With many IDaaS solutions solely...

Continue Reading →

Tags: hybrid, PortalGuard, total cost of ownership, Cloud Authentication, User Authentication, flexibility, IAM, cost-effective, IDaaS, identity management software, identity and access management, Cloud IAM, Article, Article - Resource Center

by Michael Lowe 0 Comments

How Your Cybersecurity Budget May Be Suffering from Your IAM Solution

The pressure to find or update your IAM solutions is at an all-time high. 

But when faced with this pressure, you may be choosing an IAM solution that delivers unexpected costs in overhead and licensing fees.

According to Gartner, Inc., by not looking at alternative or even open-source options you could be missing out on as high as 25% savings in your IAM budget.

When rushing to find an...

Continue Reading →

Tags: PortalGuard, total cost of ownership, Cloud Authentication, User Authentication, flexibility, IAM, cost-effective, IDaaS, identity management software, identity and access management, Cloud IAM, Article, Article - Resource Center

by Phil Heckendorf 0 Comments

Finding an IAM Solution - Flexibility is the Key

Identity and Access Management (IAM) is not a new concept or one that many organizations don't already have as part of their security strategy. However, with the evolving threats and constant changes brought on by digital transformation, customer expectations, and even an unexpected pandemic, the need to be able to adapt is more critical than ever. 

What happens though when your current...

Continue Reading →

Tags: PortalGuard, Cloud Authentication, User Authentication, flexibility, IAM, IDaaS, identity management software, identity and access management, Cloud IAM, Article, Article - Resource Center

by Christopher Perry 0 Comments

Sharepoint Password Expiration Example: Poor UI


SharePoint password expiration: that alone is often enough to make chills run down the back of a typical IT administrator. Regardless of the environment, the SharePoint platform remains a popular choice for many organizations. Reasons vary, of course, but the fact remains that the SharePoint platform shows up just about everywhere, even today. That’s not to say that everything with the...

Continue Reading →

Tags: Authentication Methods, Identity Provider, User Experience, password expiration, Password Management, #SharePoint, User Authentication

by Gregg Browinski 0 Comments

How Can a Cloud Provider Securely Access my Active Directory?

More users and companies are running software applications in the cloud than ever before. When even the US Federal government is looking to get into the cloud, it's a clear indication that it has reached wide acceptance. Similarly, Identity as a Service (IDaaS) has been around for years, but how often do admins considering this approach bother to take a deeper dive into the issue of directory...

Continue Reading →

Tags: Authentication, Authentication Methods, Authentication Security, Cloud SaaS, encryption, firewall, Identity Federation, IT Security, #security, Access Control, Access Management, Active Directory, User Authentication, VPN, OAuth 2.0, OAauth, IDaaS, directory synchronization

by Jay Ouellette 0 Comments
by Christopher Perry 0 Comments

Why Gamers Tolerate Two-Factor Authentication

Two-Factor Authentication is often a dirty phrase for end-users – though that does not seem to hold true within the gaming community. It is not a stretch of the truth to say that gamers are a temperamental lot.  We like things that work, and we hate change on principal.  Of course, opinions can shift one way or the other, but that’s the basic foundation when targeting gamers as an audience:...

Continue Reading →

Tags: 2FA, #AccountUnlock, Authentication, authentication management, Authentication Methods, Authentication Security, authentication security, #gamer, MFA, Microsoft, Multi-Factor Authentication, Access Management, Authentication Provider, OTP Authentication, Two-Factor Authentication, User Authentication, mobile authentication, mobile authenticator, blizzard, Square-Enix, Steam, XBOX, PC Games, Benefits of 2FA, Sony, PlayStation, gaming companies using 2FA

by Christopher Perry 0 Comments

7 Blogs to Revisit for National Cybersecurity Awareness Month

Since 2004, the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) have officially recognized October as National Cybersecurity Awareness Month (NCSAM).  Pulled directly from the official StaySafeOnline website, NCSAM is “…a broad effort to help all Americans stay safer and more secure online.”  Here at PortalGuard, Security is something that we take very...

Continue Reading →

Tags: Education, PortalGuard, security questions, #securityandusability, static password, strong password, technology, Tokenless Authentication, Turnkey Authentication, usability, User Experience, PortalGuard Configuration, PortalGuard for Education, service, Single-Factor Authentication, Single Sign-On (SSO), #singlesign-on, SSPR, Stand your Ground, stronger authentication, stronger security, #strongpassword, tech support, Two-Factor Authentication, User Authentication, user convenience, #userauthentication, #userexperience, Virtual Private Network, web applications, Password Reset from the Mac Desktop, reducing help desk calls, healthcare, SSO Proxy, password spraying, pwned passwords, Lanyard Login, Chrome Books, Special Education, Para Professionals, Students, Single Sign-On Options, increase security, SAML Single Logout, flexibility, security trends, secure login, Ask Christopher, technical support, geolocation, off network access, PortalGuard Authentication Provider, Google Authenticator, SMS Text Message Gateway, Duo Push Security, RSA SecurID, Duo, higher education budgeting, budget, fiscally sound decisions, classroom, OTP Methods, empower users, stolen passwords, hackers, scams, weak link, budgeting for education, university, college, community college, password policies, password length, passphrase, update your passwords, password patterns, password generator, password habits, secure passwords, challenge questions, IT Department Best Practices, impersonations, layer of security, breaches, IT Department, security risk, logging off, login session, outlook, mobile authentication, PortalGuard Security Policy, National Cybersecurity Month

by Jason Garfagna 0 Comments

Parents - The Other Type of Hacker...

It seems like every other day you hear about a new data breach or some new scam designed to steal credentials of the unsuspecting end user. With the advent of social media, it’s now easier than ever to social engineer a person’s identity for nefarious intent. With these constant barrages of attacks, there is a heavy focus in the community on executing best practices for navigating the murky...

Continue Reading →

Tags: #forgotpassword, help desk calls, #lockedout, Multi-Factor Authentication, strong password, password best practices, Password Security, PortalGuard for Education, secure authentication, Self-Service Password Reset, social engineering, SSPR, stronger authentication, Two-Factor Authentication, User Authentication, reducing help desk calls, teachers, K-5, Single Sign-On Options, secure login, stolen passwords, hackers, scams, password policies, update your passwords, password patterns, password habits, challenge questions, student accounts, IT Department Best Practices, impersonations, layer of security