GATEKEEPER BLOG

VPN 2fa - MFA for VPN Solution

Why You Need 2FA for VPNs

August 29, 2023

Introduction to 2FA for VPNs The global shift towards remote work has made Virtual Private Networks (VPNs) more crucial than ever, providing the lifeline that connects remote workers to their…

Read More
Password hygiene explained

Password Hygiene Explained

August 24, 2023

Passwords are like the keys to your personal and professional kingdoms. However, in a world rife with cyber threats, using a “123456” or “password” simply won’t do. This brings us…

Read More
Hospital Cyber Risks of Computers

Hospital Cyber Risks of Computers in High-Traffic Areas

August 23, 2023

The Silent Threat: Cybersecurity Risks of Computers in High-Traffic Public Areas like Hospitals Introduction As organizations strive for efficiency and ease of use, they increasingly deploy computer systems in public…

Read More
Secure Remote Workforce Computers Automatically using GateKeeper Proximity

Secure Remote Workforce Computers Automatically using GateKeeper Proximity

August 22, 2023

Remote work is becoming the norm rather than the exception, and cybersecurity has never been more critical. Remote workers often connect to corporate networks from various locations, substantially expanding the…

Read More
Does RADIUS support 2FA

Does RADIUS support 2FA?

August 21, 2023

Does RADIUS Support Two-Factor Authentication (2FA)? Unpacking the Synergy Introduction As network environments grow increasingly complex and security concerns reach new heights, the need for robust authentication methods becomes more…

Read More
User Onboarding Costs

Breakdown of User Onboarding Costs by Percent.

August 16, 2023

User onboarding is a crucial phase in the customer lifecycle, often acting as the first touchpoint where users interact with a platform or service. While the ultimate goal is to…

Read More
Proximity Lock for PC: Automatically Lock Computers When Users Step Away

Proximity Lock for PC: Automatically Lock Computers When Users Step Away

August 15, 2023

In today’s digital era, one of the most significant vulnerabilities for any organization is an unattended computer. Even with stringent security protocols in place, an unlocked PC is essentially an…

Read More
Securing Production

Securing Production: Why Proximity Readers are a Game-Changer for Manufacturing Facilities

August 14, 2023

The modern manufacturing facility is truly a marvel of efficiency and production, a seamless blend of human skill and technological innovation. However, this interplay between humans and machine necessitates robust…

Read More
Contactless PC Login Explained

Contactless PC Login Explained: The Future of Secure and Convenient Logins

August 13, 2023

Traditional password-based logins are increasingly being complemented—or even replaced—by more modern, contactless authentication methods. According to a report by Markets and Markets, the global market for multi-factor authentication, which includes…

Read More