Security Key – Multi Factor Authentication
Security Key for Multi-Factor Authentication explained. Hardware-based MFA keys provide an additional layer of security to your computers, website accounts, and desktop application accounts. Security key-based login is an authentication mechanism that uses a dedicated hardware device to grant the user access to a system rather than using a password or other non-hardware based means…
Read MorePreventing Man-in-the-Middle Attacks with GateKeeper.
Prevent man-in-the-middle attacks using GateKeeper 2FA. Using a 2-factor authentication solution prevents malicious actors from successfully executing a man-in-the-middle attack, even if a password is stolen. The thief would still need the second authentication factor to gain access to the targeted account. Man-in-the-middle attacks involve a malicious actor listening in on communications. A typical example…
Read MoreWhat is Authentication Intent?
Authentication intent is a specific action required by the user intending to login. IT admins also use intent to reduce unintended login risks. Examples of requiring authentication intent include typing in an OTP, inserting a USB, scanning a token, pushing a button, and perhaps biometrics. NIST Special Publication 800-63B 5.2.9 defines “authentication intent” as the following: “An…
Read MoreKeyless-Go Data Protection
BY ROBERT KORHERR Nov. 3, 2020 / MUNICH, GERMANY — Secure authentication is one of the basic requirements of IT grand strategy. “Name” and “password” are no longer sufficient in many environments. The two-factor authentication with a one-time additional password or passcode (OTP) offers a hurdle that is extremely helpful against many attack scenarios such as phishing, pharming, man-in-the-middle…
Read MoreWhat’s the difference between lock, switch user, and sign out?
GateKeeper Authentication lock options. Windows 10 has three options when the user leaves the computer with their GateKeeper token: lock, switch user, and sign out. GateKeeper proximity lock allows either the user to select their default option. Similarly, admins can control enforce options for users. Picking the right option is crucial for certain industries like…
Read MorePasswordless EMR Login for Healthcare
EHR login without passwords. Auto-fill your username and password onto any web-based EMR/EHR using GateKeeper® Proximity. Simply add your EMR’s website, username, password, and if needed, OTP. Login to your EMR without typing passwords. Login to EPIC, CERNER, Athena, NextGen, Allscripts, Eagle, GE Centricity, AdvancedMD, Kareo, and more with typing passwords! Whenever there’s a password change, no…
Read MorePhishing Attacks Explained.
A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method of this attack is to send an official-looking email to dupe the victim into freely providing the correct information. This attack can also be approached…
Read MoreGateKeeper Enterprise Won Rising Star Award from B2B Platform
GateKeeper Enterprise is the recipient of two awards from CompareCamp: the Rising Star Award and the Great User Experience Award. Industry experts and active users that have evaluated and compared numerous identity management software before choosing GateKeeper Proximity. CompareCamp is a credible B2B review platform that is considered as the leading authority when it comes…
Read MoreGateKeeper Integrates with Active Directory for Easy User On-boarding
GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper platform. The integration with AD allows administrators to select users from the AD and bulk-add them to GateKeeper Enterprise. This reduces the time and effort…
Read More