GATEKEEPER BLOG

Phishing prevention 2FA solution.

Phishing Attacks Explained.

April 4, 2020

A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method of this attack is to send an official-looking email to dupe the victim into freely providing the correct information. This attack can also be approached…

Read More
HIPAA solution provider.

HIPAA compliance solution – GateKeeper Enterprise

February 20, 2020

How GateKeeper Proximity helps Automate HIPAA. A HIPAA compliance solution should consider how to ease the burden of the clinicians, not just meet raw compliance. “21 percent of healthcare employees write down their user names and passwords near their computer.” – Accenture Healthcare Workforce Survey on Cybersecurity GateKeeper Enterprise is widely used for automated HIPAA…

Read More
AD integration solution.

GateKeeper Integrates with Active Directory for Easy User On-boarding

January 12, 2020

GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper platform. The integration with AD allows administrators to select users from the AD and bulk-add them to GateKeeper Enterprise. This reduces the time and effort…

Read More
Best IAM solutions for enterprise.

3 Sectors that Benefited Most from Identity Management Software

December 3, 2019

The pace at which modern technologies advance is nothing short of impressive. Companies are able to gather and analyze more information and generate actionable insights of better quality. That said, these technological improvements come with great security risks to corporations and businesses of all sizes, including, but not limited to massive data breaches, identity theft,…

Read More
Prevent password spraying.

Prevent Password Spraying Attacks with GateKeeper 2FA

November 6, 2019

Password spraying is type of cyberattack that takes advantage of users’ common, weak, and easily-guessed passwords. Instead of traditional brute-force attacks that generally target a single account with as many possible password combinations as possible, password spraying attacks involve brute-forcing a large number of accounts using a single password that the malicious actor knows to…

Read More
Reduce attack surface and attack vectors with proximity 2FA.

How to Reduce Cyber Attack Vectors

September 27, 2019

Cyberattack vector explained. A cyber attack vector is any way an attacker can gain unauthorized data or access to a system. The attack surface is the sum of all possible attack directions (“attack vectors”) in an environment. There are two types of attack surfaces: physical and digital. But, there are many different attack vectors cybercriminals…

Read More