What is Authentication Intent?
Authentication intent is a specific action required by the user intending to login. IT admins also use intent to reduce unintended login risks. Examples of requiring authentication intent include typing…
How to set up 2FA Key – GateKeeper Enterprise
Set up GateKeeper Enterprise 2FA key on your end user computers using the directions below. Choose your login option (PIN, touch, Enter) and also your lock method. Please make sure…
What’s the difference between lock, switch user, and sign out?
GateKeeper Authentication lock options. Windows 10 has three options when the user leaves the computer with their GateKeeper token: lock, switch user, and sign out. GateKeeper proximity lock allows either…
Phishing Attacks Explained.
A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method…
GateKeeper Enterprise Won Rising Star Award from B2B Platform
GateKeeper Enterprise is the recipient of two awards from CompareCamp: the Rising Star Award and the Great User Experience Award. Industry experts and active users that have evaluated and compared…
GateKeeper Integrates with Active Directory for Easy User On-boarding
GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper…
Prevent Password Spraying Attacks with GateKeeper 2FA
Password spraying is type of cyberattack that takes advantage of users’ common, weak, and easily-guessed passwords. Instead of traditional brute-force attacks that generally target a single account with as many…
Phishing Attack Prevention with a Key
A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method…
How to Reduce Cyber Attack Vectors
Cyberattack vector explained. A cyber attack vector is any way an attacker can gain unauthorized data or access to a system. The attack surface is the sum of all possible…