GATEKEEPER BLOG

HIPAA solution provider.

HIPAA compliance solution – GateKeeper Enterprise

February 20, 2020

How GateKeeper Proximity helps Automate HIPAA. A HIPAA compliance solution should consider how to ease the burden of the clinicians, not just meet raw compliance. “21 percent of healthcare employees write down their user names and passwords near their computer.” – Accenture Healthcare Workforce Survey on Cybersecurity GateKeeper Enterprise is widely used for automated HIPAA…

Read More
AD integration solution.

GateKeeper Integrates with Active Directory for Easy User On-boarding

January 12, 2020

GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper platform. The integration with AD allows administrators to select users from the AD and bulk-add them to GateKeeper Enterprise. This reduces the time and effort…

Read More
Best IAM solutions for enterprise.

3 Sectors that Benefited Most from Identity Management Software

December 3, 2019

The pace at which modern technologies advance is nothing short of impressive. Companies are able to gather and analyze more information and generate actionable insights of better quality. That said, these technological improvements come with great security risks to corporations and businesses of all sizes, including, but not limited to massive data breaches, identity theft,…

Read More
Prevent password spraying.

Prevent Password Spraying Attacks with GateKeeper 2FA

November 6, 2019

Password spraying is type of cyberattack that takes advantage of users’ common, weak, and easily-guessed passwords. Instead of traditional brute-force attacks that generally target a single account with as many possible password combinations as possible, password spraying attacks involve brute-forcing a large number of accounts using a single password that the malicious actor knows to…

Read More
Reduce attack surface and attack vectors with proximity 2FA.

How to Reduce Cyber Attack Vectors

September 27, 2019

Cyberattack vector explained. A cyber attack vector is any way an attacker can gain unauthorized data or access to a system. The attack surface is the sum of all possible attack directions (“attack vectors”) in an environment. There are two types of attack surfaces: physical and digital. But, there are many different attack vectors cybercriminals…

Read More
Reducing Password Changes.

Reducing Password Change Tasks

August 12, 2019

Preventing so many password changes. GateKeeper Proximity password manager allows users to log on to their computers using their GateKeeper Token (hardware security token, or Trident phone app) instead of having to manually type in their username and password. Reduce password change requirements and increase security. This password-free login allows administrators the option of setting…

Read More
Lock unattended computers automatically.

Dangers of Unlocked Computers

July 19, 2019

With reliance on the Internet only continuing to rise, there’s more value available for theft through our computers. People keep leaving computers unlocked, despite years of knowing the dangers. There are plenty of horror stories in the news and even more that go largely unnoticed on blogs and social media sites, especially ones that focus…

Read More