Bluetooth Proximity Lock for Workstations
Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some…
Read MoreSecurity Key – Multi Factor Authentication
Security Key for Multi-Factor Authentication explained. Hardware-based MFA keys provide an additional layer of security to your computers, website accounts, and desktop application accounts. Security key-based login is an authentication…
Read MoreAuthentication Methods
What is an Authentication Method? Authentication is a security mechanism that requires predetermined evidence (factor) before being granted authorization to a system. 2FA is consists of two different required authentication…
Read MorePreventing Man-in-the-Middle Attacks with GateKeeper.
Prevent man-in-the-middle attacks using GateKeeper 2FA. Using a 2-factor authentication solution prevents malicious actors from successfully executing a man-in-the-middle attack, even if a password is stolen. The thief would still…
Read MoreWhat is Authentication Intent?
Authentication intent is a specific action required by the user intending to login. IT admins also use intent to reduce unintended login risks. Examples of requiring authentication intent include typing…
Read MoreHow to set up 2FA Key – GateKeeper Enterprise
Set up GateKeeper Enterprise 2FA key on your end user computers using the directions below. Choose your login option (PIN, touch, Enter) and also your lock method. Please make sure…
Read MoreKeyless-Go Data Protection
BY ROBERT KORHERR Nov. 3, 2020 / MUNICH, GERMANY — Secure authentication is one of the basic requirements of IT grand strategy. “Name” and “password” are no longer sufficient in many…
Read MoreWhat’s the difference between lock, switch user, and sign out?
GateKeeper Authentication lock options. Windows 10 has three options when the user leaves the computer with their GateKeeper token: lock, switch user, and sign out. GateKeeper proximity lock allows either…
Read MorePhishing Attacks Explained.
A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method…
Read More