GateKeeper Enterprise Won Rising Star Award from B2B Platform
GateKeeper Enterprise is the recipient of two awards from CompareCamp: the Rising Star Award and the Great User Experience Award. Industry experts and active users that have evaluated and compared numerous identity management software before choosing GateKeeper Proximity. CompareCamp is a credible B2B review platform that is considered as the leading authority when it comes…
Read MoreGateKeeper Integrates with Active Directory for Easy User On-boarding
GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper platform. The integration with AD allows administrators to select users from the AD and bulk-add them to GateKeeper Enterprise. This reduces the time and effort…
Read More3 Sectors that Benefited Most from Identity Management Software
The pace at which modern technologies advance is nothing short of impressive. Companies are able to gather and analyze more information and generate actionable insights of better quality. That said, these technological improvements come with great security risks to corporations and businesses of all sizes, including, but not limited to massive data breaches, identity theft,…
Read MorePrevent Password Spraying Attacks with GateKeeper 2FA
Password spraying is type of cyberattack that takes advantage of users’ common, weak, and easily-guessed passwords. Instead of traditional brute-force attacks that generally target a single account with as many possible password combinations as possible, password spraying attacks involve brute-forcing a large number of accounts using a single password that the malicious actor knows to…
Read MorePhishing Attack Prevention with a Key
A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method of this attack is to send an official-looking email/communication to dupe the victim into freely providing the correct information. Usually the email comes from a…
Read MoreHow to Reduce Cyber Attack Vectors
Cyberattack vector explained. A cyber attack vector is any way an attacker can gain unauthorized data or access to a system. The attack surface is the sum of all possible attack directions (“attack vectors”) in an environment. There are two types of attack surfaces: physical and digital. But, there are many different attack vectors cybercriminals…
Read MoreReducing Password Change Tasks
Preventing so many password changes. GateKeeper Proximity password manager allows users to log on to their computers using their GateKeeper Token (hardware security token, or Trident phone app) instead of having to manually type in their username and password. Reduce password change requirements and increase security. This password-free login allows administrators the option of setting…
Read MoreDangers of Unlocked Computers
With reliance on the Internet only continuing to rise, there’s more value available for theft through our computers. People keep leaving computers unlocked, despite years of knowing the dangers. There are plenty of horror stories in the news and even more that go largely unnoticed on blogs and social media sites, especially ones that focus…
Read MoreLogin Options for GateKeeper Proximity 2FA
Login Options Available on GateKeeper®. Hands-free login to workstations, websites, and desktop applications. Turbocharge your end users’ login options for a more productive workforce. Most importantly, IT admins can increase security while actually letting users login faster! GateKeeper Proximity has multiple convenient login options available for IT admins to let end user login with: 2FA…
Read More