How to set up 2FA key with GateKeeper Enterprise

How to set up 2FA Key – GateKeeper Enterprise

December 7, 2020

Set up GateKeeper Enterprise 2FA key on your end user computers using the directions below. Choose your login option (PIN, touch, Enter) and also your lock method. Please make sure you have your GateKeeper Client software installed on your computer and your token registered (GateKeeper 2FA key fob or GateKeeper Trident phone app) before setting…

Read More

Keyless-Go Data Protection

November 3, 2020

BY ROBERT KORHERR Nov. 3, 2020 / MUNICH, GERMANY — Secure authentication is one of the basic requirements of IT grand strategy. “Name” and “password” are no longer sufficient in many environments. The two-factor authentication with a one-time additional password or passcode (OTP) offers a hurdle that is extremely helpful against many attack scenarios such as phishing, pharming, man-in-the-middle…

Read More
What is the difference between lock and log off?

What’s the difference between lock, switch user, and sign out?

July 9, 2020

GateKeeper Authentication lock options. Windows 10 has three options when the user leaves the computer with their GateKeeper token: lock, switch user, and sign out. GateKeeper proximity lock allows either the user to select their default option. Similarly, admins can control enforce options for users. Picking the right option is crucial for certain industries like…

Read More
Auto-fill EHR passwords.

Passwordless EMR Login for Healthcare

June 17, 2020

EHR login without passwords. Auto-fill your username and password onto any web-based EMR/EHR using GateKeeper® Proximity. Simply add your EMR’s website, username, password, and if needed, OTP. Login to your EMR without typing passwords. Login to EPIC, CERNER, Athena, NextGen, Allscripts, Eagle, GE Centricity, AdvancedMD, Kareo, and more with typing passwords! Whenever there’s a password change, no…

Read More
Phishing prevention 2FA solution.

Phishing Attacks Explained.

April 4, 2020

A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method of this attack is to send an official-looking email to dupe the victim into freely providing the correct information. This attack can also be approached…

Read More