What is Authentication Intent?
Authentication intent is a specific action required by the user intending to login. IT admins also use intent to reduce unintended login risks. Examples of requiring authentication intent include typing…
Read MoreHow to set up 2FA Key – GateKeeper Enterprise
Set up GateKeeper Enterprise 2FA key on your end user computers using the directions below. Choose your login option (PIN, touch, Enter) and also your lock method. Please make sure…
Read MoreWhat’s the difference between lock, switch user, and sign out?
GateKeeper Authentication lock options. Windows 10 has three options when the user leaves the computer with their GateKeeper token: lock, switch user, and sign out. GateKeeper proximity lock allows either…
Read MorePhishing Attacks Explained.
A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method…
Read MoreGateKeeper Enterprise Won Rising Star Award from B2B Platform
GateKeeper Enterprise is the recipient of two awards from CompareCamp: the Rising Star Award and the Great User Experience Award. Industry experts and active users that have evaluated and compared…
Read MoreGateKeeper Integrates with Active Directory for Easy User On-boarding
GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper…
Read MorePrevent Password Spraying Attacks with GateKeeper 2FA
Password spraying is type of cyberattack that takes advantage of users’ common, weak, and easily-guessed passwords. Instead of traditional brute-force attacks that generally target a single account with as many…
Read MorePhishing Attack Prevention with a Key
A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method…
Read MoreHow to Reduce Cyber Attack Vectors
Cyberattack vector explained. A cyber attack vector is any way an attacker can gain unauthorized data or access to a system. The attack surface is the sum of all possible…
Read More