MULTI-FACTOR AUTHENTICATION


TraitWare delivers simple, secure access to Citrix Workspace

Citrix continues to empower companies to have better and more secure access to enterprise resources. Now, it has expanded its capabilities and enhanced user experience, efficiency, and security by deploying modern authentication integrations for Citrix Workspace via SAML 2.0. What is SAML 2.0? Security Assertion Markup Language (SAML) is an XML-based open standard for transferring identity […]


Are You Using the Most Effective Cloud Security Controls?

No doubt enterprises have embraced the cloud, but how about optimizing their cloud security controls? It seems that many enterprises are still not using the crucial tools offered by their cloud provider to ensure tracking, better control user access, and enhance security at every turn. To get the most out of your cloud services, you […]


The Best Practices for User Provisioning and De-provisioning

  User provisioning is a standard component of onboarding and involves creating user accounts for a newly hired employee. It entails access to IT resources (including the directory) and to systems, networks, and applications that are vital to the employee’s performance of their job. The usual IT resources provided to a new employee include the […]


How Can You Optimize Passwordless Authentication?

Have you gone passwordless yet? Making the switch may be the best security move you can make today, because passwords are becoming even less secure, especially when you consider users’ tendency to have poor password security habits. For example, 52 percent of users reuse the same password for multiple accounts, and 59 percent of American […]


ZeroTrust and work from Mars, By Chris Werpy, COO, PlanetOne

As our Planet made the shift to work from wherever, remote access exploded in numbers and speed, with capacity taking the lead.  Looking ahead, it’s time to determine how to not only keep the lights on, but to drive increased productivity without compromising security. Is the environment we work in today designed for the future, […]


Make MFA Adoption Easier for Everyone in Your Organization

Multifactor authentication (MFA) is a must for enterprises to ensure data security in the face of both new attacks and persistent older ones that are constantly being fine-tuned by cybercriminals. It offers multiple layers of security to your login processes through multiple means of authentication.  However, while MFA is intended to thwart cybercriminals attempting to […]


Should Have Authentication and Authorization to be Cyber secure

How Is Authentication Different from Authorization, and Why Should You Have Both? Authentication is concerned with identity, while authorization is concerned with action. Authentication involves validating the identity of a registered user attempting to gain access to data resources such as an application, an API, or microservices.  Authorization involves specifying what actions a registered user […]


Zero Trust, and How Does Multifactor Authentication Support It?

 What Is Zero Trust, and How Does Multifactor Authentication Support It? At the 29th iteration of the RSA Conference (RSAC), one of the most well-attended yearly events for online security, discussions zeroed in on the urgency for more fresh strategies to battle threats to data security. While banking and telecommunications industries obviously have huge stakes […]


How to Use Single Sign-On and Multifactor Authentication together?

Unforeseen crises like the COVID-19 pandemic has shown just how ruthless cybercriminals can get. They can carry out their attacks with tactical precision, taking full advantage of the fact that businesses are distracted and vulnerable. Single Sign On and Multifactor Authentication are a must have. If you are among those businesses who are still relying […]


How Biometric Authentication Improves User and Enterprise Security?

Biometric authentication is a method of digital identification and authentication through physical or behavioral human characteristics for access to systems, devices, or data. It is one of the methods that drive both two-factor authentication (2FA) and multifactor authentication (MFA).  Biometrics is one of the technologies that are being adopted as more advanced methods to address increasing […]


5 Ways To Protect Your Company Against Hackers

How are you protecting your company? Most data breaches in the headlines involve big companies—Yahoo, Facebook, Equifax. However, while smaller companies are off the news radar, this does not mean that they are immune from malicious attacks. In fact, the risk is even higher as many small businesses may not have proper security measures and […]


5 Common Cyber Security Attacks That Can Harm Your Business

Small businesses are prone to cyber security attacks. Although targeting big companies seems to have better pay-off, small to medium-sized businesses (SMBs) with limited IT infrastructure are also very tempting for attackers.  According to a 2018 report, 58 percent of cyberattacks were targeted to SMBs with fewer than 250 employees. The worse thing is—hackers can […]