Software as a Service ("SaaS") is a cloud computing model in which software is provided and used over the internet. In return, this eliminates the need for user owned local servers or computers that must have software manually installed and maintained.

The Saudi Arabian Monetary Authority (SAMA) introduced the SAMA Cyber Security Framework for all banks, insurance companies, and finance companies operating in Saudi Arabia to adhere to.

A shared account is a single login account that is shared between multiple people. Typical examples of shared accounts include sharing a computer login account, email accounts, streaming services. Shared accounts allow multiple users to access a resource that may have only been meant for a single user. In corporate IT security, shared accounts are not in line with best practices due to the lack of accountability and auditability.

A shared workstation is a computer that is accessed by more than one user. Also known as a "kiosk computer". In most cases, workstations in the workplace are shared because of a need to share a certain desktop application login, save cost on licensing per user accounts, or just to save time on logging in.

Shoulder surfing is a social engineering act of looking over a user's shoulder to gain unauthorized data. A prime example of shoulder surfing is watching someone's keystrokes as they type their password. Shoulder surfing can also occur over CCTV camera footage or even by malicious actors using high-powered binoculars.

Social engineering is a method of manipulation seeks to exploit people (usually confidential information such as login credentials, bank information, etc.) using social behavior such as trust. Social engineering can happen unknowingly since lying and subterfuge are components used by social engineers in their methods. Mitigating social engineering risks is key to a strong cyber security posture.

A software token ("soft token") is a software-based security token (rather than hardware-based, such as a physical key fob). The software token can be stored on the laptop, desktop, smartphone, or other electronic device.

SSO (Single Sign-On) is a method of authentication and access control that grants authorized users access to multiple applications with a single input of their credentials. This central identity management system then allows users to access applications without the need to re-enter their credentials.

Syslog is a standard messaging protocol for sending and receiving event messages on Unix-based operating systems. With it, users receive detailed, formatted information about errors, warnings, and other relevant data generated by the network or connected devices.

According to studies, over 30% of all support tickets are related to password resets/forgotten passwords.

Enterprise 2FA and password manager. One key for all your passwords. Experience fully automated login and security. Faster 2FA, auto-OTP, password manager, and worry-free workflow with proximity-based privileged access management for Windows 11, 10, 8, 7, macOS, desktop applications, and websites.

Download the free Android app.

Proximity-based passwordless 2FA

Active Directory integration with admin console

Automatic lock for all workstations

Continuous authentication password manager

Automatic OTP on websites for 2FA

Wireless login for PC, Mac, web, and software

or call 240-547-5446