GATEKEEPER BLOG

Authentication solution provider

What is Authentication Intent?

February 10, 2021

Authentication intent is a specific action required by the user intending to login. IT admins also use intent to reduce unintended login risks. Examples of requiring authentication intent include typing…

Read More
How to set up 2FA key with GateKeeper Enterprise

How to set up 2FA Key – GateKeeper Enterprise

December 7, 2020

Set up GateKeeper Enterprise 2FA key on your end user computers using the directions below. Choose your login option (PIN, touch, Enter) and also your lock method. Please make sure…

Read More
What is the difference between lock and log off?

What’s the difference between lock, switch user, and sign out?

July 9, 2020

GateKeeper Authentication lock options. Windows 10 has three options when the user leaves the computer with their GateKeeper token: lock, switch user, and sign out. GateKeeper proximity lock allows either…

Read More
Phishing prevention 2FA solution.

Phishing Attacks Explained.

April 4, 2020

A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method…

Read More
AD integration solution.

GateKeeper Integrates with Active Directory for Easy User On-boarding

January 12, 2020

GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper…

Read More
Prevent password spraying.

Prevent Password Spraying Attacks with GateKeeper 2FA

November 6, 2019

Password spraying is type of cyberattack that takes advantage of users’ common, weak, and easily-guessed passwords. Instead of traditional brute-force attacks that generally target a single account with as many…

Read More
Reduce attack surface and attack vectors with proximity 2FA.

How to Reduce Cyber Attack Vectors

September 27, 2019

Cyberattack vector explained. A cyber attack vector is any way an attacker can gain unauthorized data or access to a system. The attack surface is the sum of all possible…

Read More