GATEKEEPER BLOG

Proximity computer lock.

Bluetooth Proximity Lock for Workstations

April 27, 2021

Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some are easier to use while others have more dynamic features for IT admins with a central admin console. Though this may require some setup or…

Read More
MFA token for improving workflow performance.

Security Key – Multi Factor Authentication

April 15, 2021

Security Key for Multi-Factor Authentication explained. Hardware-based MFA keys provide an additional layer of security to your computers, website accounts, and desktop application accounts. Security key-based login is an authentication mechanism that uses a dedicated hardware device to grant the user access to a system rather than using a password or other non-hardware based means…

Read More
Authentication solutions for 2FA.

Authentication Methods

March 31, 2021

What is an Authentication Method? Authentication is a security mechanism that requires predetermined evidence (factor) before being granted authorization to a system. 2FA is consists of two different required authentication methods. MFA may require more than two factors of authentication before a user can access a system. The most common examples of authentication factors are…

Read More
Prevent MitM attacks solution.

Preventing Man-in-the-Middle Attacks with GateKeeper.

March 6, 2021

Prevent man-in-the-middle attacks using GateKeeper 2FA. Using a 2-factor authentication solution prevents malicious actors from successfully executing a man-in-the-middle attack, even if a password is stolen. The thief would still need the second authentication factor to gain access to the targeted account. Man-in-the-middle attacks involve a malicious actor listening in on communications. A typical example…

Read More
Authentication solution provider

What is Authentication Intent?

February 10, 2021

Authentication intent is a specific action required by the user intending to login. IT admins also use intent to reduce unintended login risks. Examples of requiring authentication intent include typing in an OTP, inserting a USB, scanning a token, pushing a button, and perhaps biometrics. NIST Special Publication 800-63B 5.2.9 defines “authentication intent” as the following: “An…

Read More
What is the difference between lock and log off?

What’s the difference between lock, switch user, and sign out?

July 9, 2020

GateKeeper Authentication lock options. Windows 10 has three options when the user leaves the computer with their GateKeeper token: lock, switch user, and sign out. GateKeeper proximity lock allows either the user to select their default option. Similarly, admins can control enforce options for users. Picking the right option is crucial for certain industries like…

Read More
Phishing prevention 2FA solution.

Phishing Attacks Explained.

April 4, 2020

A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method of this attack is to send an official-looking email to dupe the victim into freely providing the correct information. This attack can also be approached…

Read More