GATEKEEPER BLOG

Security on shared computers. Kiosk computer security.

See Who is Logging in on Shared Windows Accounts

August 1, 2021

Need to accurately audit access logs across the network due to a shared computer? Not easy to track who is logging in when to which computer? Usually, admins can go…

Read More
Improving patient care with faster EHR login.

Improving Patient Care by Reducing IT Burdens on Physicians

June 1, 2021

The words condemning the inefficiencies and excessive administrative tasks of the current electronic health record (EHR) system came directly from the American College of Physicians (ACP). They called it “inefficient,…

Read More
Proximity authentication solution.

What is Proximity Authentication?

May 15, 2021

Proximity authentication explained. Proximity authentication is the process of authenticating users of a system via their presence (proximity) using either a proximity token or smartphone. If the user is in…

Read More

Preventing Password Fatigue & Stress

May 6, 2021

Stress alert! The biggest password problem might be the fatigue and stress. Password stress happens when users must memorize and type a large number of passwords on a consistent basis. Nobody…

Read More
Proximity computer lock.

Bluetooth Proximity Lock for Workstations

April 27, 2021

Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some…

Read More
MFA token for improving workflow performance.

Security Key – Multi Factor Authentication

April 15, 2021

Security Key for Multi-Factor Authentication explained. Hardware-based MFA keys provide an additional layer of security to your computers, website accounts, and desktop application accounts. Security key-based login is an authentication…

Read More
How to set up 2FA key with GateKeeper Enterprise

How to set up 2FA Key – GateKeeper Enterprise

December 7, 2020

Set up GateKeeper Enterprise 2FA key on your end user computers using the directions below. Choose your login option (PIN, touch, Enter) and also your lock method. Please make sure…

Read More

Keyless-Go Data Protection

November 3, 2020

BY ROBERT KORHERR Nov. 3, 2020 / MUNICH, GERMANY — Secure authentication is one of the basic requirements of IT grand strategy. “Name” and “password” are no longer sufficient in many…

Read More