GATEKEEPER BLOG

Phishing Attacks Explained.

April 4, 2020

A phishing attack is a fraudulent effort by a cybercriminal to steal a victim’s credentials (username and password) or other sensitive information such as credit card numbers. The main method…

GateKeeper Integrates with Active Directory for Easy User On-boarding

January 12, 2020

GateKeeper Hub, which is the centralized management solution for GateKeeper Enterprise, can be connected to your on-premise or Azure Active Directory to help in on-boarding users on to the GateKeeper…

3 Sectors that Benefited Most from Identity Management Software

December 3, 2019

The pace at which modern technologies advance is nothing short of impressive. Companies are able to gather and analyze more information and generate actionable insights of better quality. That said,…

Prevent Password Spraying Attacks with GateKeeper 2FA

November 6, 2019

Password spraying is type of cyberattack that takes advantage of users’ common, weak, and easily-guessed passwords. Instead of traditional brute-force attacks that generally target a single account with as many…

How to Reduce Cyber Attack Vectors

September 27, 2019

Cyberattack vector explained. A cyber attack vector is any way an attacker can gain unauthorized data or access to a system. The attack surface is the sum of all possible…

Reducing Password Change Tasks

August 12, 2019

Preventing so many password changes. GateKeeper Proximity password manager allows users to log on to their computers using their GateKeeper Token (hardware security token, or Trident phone app) instead of…

Dangers of Unlocked Computers

July 19, 2019

With reliance on the Internet only continuing to rise, there’s more value available for theft through our computers. People keep leaving computers unlocked, despite years of knowing the dangers. There…