Instead of asking employees to input passwords every day, single sign-on (SSO) offers a simplified but secure authentication process. SSO authentication gives a user the option of choosing a single…
Browsing CategorySingle Sign-On (SSO)
Support Remote Workforce Productivity With Secure Cloud Services
Remote workforces have become increasingly mainstream over the past few years due to several benefits, and more recently, out of necessity. In the U.S., the remote workforce increased 159 percent…
Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know
Channel your best Alex Trebek voice: According to TechTimes, 70 percent of employees report not truly understanding this topic, which deals with — among other things — reasons to not…
How Unified Policy Management Can Enable Business Flexibility, Productivity and Security
Do laptops have a place in the modern workplace? With more than 57 percent of enterprise internet usage occurring over mobile devices as of 2017, according to BrightEdge, and Gartner…
Why Zero Trust Is Critical to a Productive Mobile Workforce
The concept of zero trust has been around since John Kindervag coined the term in 2010. Google’s internal implementation through it’s BeyondCorp team in 2011 was one of the first…
6 Steps to Modernize Your On-Premises Identity and Access Management Architecture
The time has come to modernize your on-premises identity and access management (IAM) system. As organizations of all sizes and across industries move data and applications to the cloud, some…
iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps
Apple users of the world, 13 is your lucky number: iOS 13 has arrived! As expected, this new iteration of Apple’s mobile operating system comes with a slew of changes,…
The Fine Art of Protecting Microsoft Office 365 Apps With Multifactor Authentication
The initials MFA, as every computer security professional knows, stand for multifactor authentication. The same initials also stand for Master of Fine Arts, and maybe that’s no accident. Protecting your…
4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise
The sophomore season of “Star Trek: Discovery” beamed and streamed its way to critical acclaim this year, praised by viewers and reviewers alike for improved writing, interesting characters and a…
Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security
More and more, organizations and end users are embracing encryption to protect their data and traffic. By far the most visible part of this adaptation is the use of Hypertext…