Why do we need to protect Cisco VPN? Typically, a Cisco VPN client uses a user ID and password to connect to the corporate network. This is very insecure way of connecting, in order to make the connectivity more secure we need to include second factor authentication method. In this blog post we are showing […]
Integrating biometric authentication with Active Directory can be a simple process. If you already use Azure Active Directory, it’s as simple as using the built-in MFA. If you’re not using Azure, there are other options, like Okta, that we recommend. Here’s a guide. What is biometric authentication? Biometric authentication refers to fingerprints, facial recognition, […]
CyberArk pros and cons are straightforward and easy to understand. CyberArk is an identity and access management solution for enterprises. While CyberArk historically focused only on Privileged Account Access, their recent acquisition of Idaptive makes CyberArk a complete IAM solution offering SSO and MFA. Here’s an overview. What is CyberArk? CyberArk is an identity management […]
Okta is our preferred Single Sign On and Multi-Factor Authentication solution that offers modular PAM tools, too. CyberArk was historically a PAM solution as CyberArk Vault. However, CyberArk recently acquired Idaptive to offer a complete IAM solution stack. Which is right for your company? Here’s a quick guide. What is CyberArk? CyberArk offers CyberArk Vault […]
Cyber Security Manager Salary is obviously a primary consideration when hiring an in-house, full-time security team. But is a full-time employee a better solution than outsourcing a security consultant? It makes sense to compare the costs and benefits of full-time employees, versus outsourcing a managed security service provider. Often an MSSP can offer a better […]
Biometric voice authentication is a great option for specific identity management and sign-on circumstances. Here’s a guide to when and why we recommend and implement voice authentication for clients. What is biometric voice authentication? Biometric voice authentication uses your voice to verify account identity. Everybody’s voice is different, based on their own biology (i.e., mouth […]
CyberArk competitors include Okta, BeyondTrust, Thycotic, Remediant, and Centrify. They’re all Identity and Access Management solutions, and we implement them for clients regularly. What are their main differences, and why should your business choose one over the other? Some competitors are .NET-friendlier, and some simply cost less. Here’s a guide. What is CyberArk? CyberArk […]
ForgeRock features compare similarly to Okta, both are identity management solutions that offer easy implementation. ForgeRock may be better suited specifically for enterprise, while Okta’s modular product offerings allow any size company to begin with Okta, and scale to enterprise capabilities. For example, a mid-size company may choose Okta, and stick with Okta as it […]
AlienVault SOAR is an automated cybersecurity response product. To be clear, AlienVault is a fully SaaS-driven Security Automation Orchestration and Response (SOAR) solution. AlienVault offers a single event dashboard, the ability to see threads and take action, event management, and extensive monitoring. While there are many SOAR solutions to choose from, we confidently recommend AlienVault, […]
Centrify offers MFA at System Login, which ensures that “only authorized humans are accessing your critical infrastructure.” This is an MFA login that provides access to the Centrify privileged access management tool (PAM) called Centrify Zero Trust Privilege. If you’re looking for a general multi factor authentication tool, then you might prefer Idaptive MFA. Idaptive […]
Remediant SecureONE and CyberArk Vault are both Privileged Access Management (PAM) solutions. Remediant SecureONE is “agent-less, vault-less, and never shared”, while CyberArk Vault takes a “risk-based approach to credential and session management.” What’s that mean? Remediant is a lower-cost security solution that is easier to implement, while still protecting access to servers and endpoints. CyberArk […]
Gigya was a customer identity and access management security solution best-suited for retail business and enterprise, because it offered customer analytics and insights. Gigya was acquired by SAP, and is now part of SAP Customer Data Cloud. If your business is considering a migration away from Gigya/SAP to Okta, here’s a guide. What is […]