Best XyLoc Alternative – GateKeeper Proximity
Looking to lock workstations automatically when users leave? GateKeeper’s “walk-away lock” mechanism maximizes user productivity while increasing computer security. If you’re looking for the best XyLoc alternative, check out the Capterra comparison page for XyLoc and GateKeeper. Login to your workstation using a token. Simply tap to login, just like with an RFID card. For…
Read MoreThin Client 2FA using GateKeeper Proximity
Thin Client 2FA Access with GateKeeper Proximity. 2FA thin client access is crucial for any good security infrastructure. But protecting access to thin clients and RDP isn’t always straight-forward. The GateKeeper 2FA Client application (installed on end user computers) authenticates end users into thin clients running Windows with the proper requirements. This process ONLY authenticates…
Read MoreHow the ENIGMA Cipher was Hacked in World War 2
The iconic ENIGMA machine was widely used during World War 2 by the German military and thought to be uncrackable. But, the incredible story of how the ENIGMA cipher code was hacked involved brute forcing, an insider threat, human error, and even just plain luck (bad luck for the other side). The Insider Threat that…
Read MoreHow Faster Authentication and Auto-logouts Help Patient Care
In the field of medical care, efficiency and efficacy are paramount. Patients need to receive the very best care promptly — something which will, in turn, reduce costs and improve satisfaction. But this is difficult, especially in these demanding times. Giving care providers a means to quickly and securely login to workstations and software platforms…
Read MoreThin Client Benefits
Modern businesses are constantly on the lookout for ways to improve IT effectiveness and cost-efficiency. IT hardware budgets have fallen on average in the last two years, from 35% of total IT budget in 2019 to only 31% in 2021. What’s more, IT departments now expect more from their solutions at a more amenable price…
Read MoreHistory of the Password
The Evolution of the Password Throughout History Every few months, banks, our company’s IT department, email clients and certain apps remind us to change our passwords. And when we do, some systems even assess the level of difficulty of our new passwords, telling us if our new password is weak or strong. We’re also told…
Read MoreWhy Password Change Requirements are Bad
Is your password policy to change passwords every so often? 90 days? According to NIST, the FTC, Microsoft, and other leading organizations, required password changes might be a bad idea for both security and convenience. Forced password changes wasn’t a bad idea. But relying on end users to frequently change their passwords leads to the…
Read MoreReduce Helpdesk Tickets with a Password Manager
Reduce helpdesk tickets with a password manager Is your helpdesk inundated with password problems? According to a study carried out by Google, around 75% of people report experiencing password issues. In a climate where cybercrime is on the rise, it’s wise to encourage your employees to use multiple complex passwords. However, if they’re continuously forgetting…
Read MoreAchieving CMMC Level 3 Certification with the GateKeeper Token
The CMMC is a cybersecurity framework implemented by the Department of Defense (DoD) in an effort to protect the data of all Americans and to foster a long-term culture of cyber hygiene. Since 2020, the team behind CMMC has been conducting auditing procedures and offering certifications to businesses that meet their exacting standards. Therefore, we…
Read More