Blogs

August 18, 2020

Okta vs CyberArk: How to choose?

Okta is our preferred Single Sign On and Multi-Factor Authentication solution that offers modular PAM tools, too. CyberArk was historically a PAM solution as CyberArk Vault. However, CyberArk recently acquired Idaptive to offer a complete IAM solution stack. Which is right for your company? Here’s a quick guide. What is CyberArk? CyberArk offers CyberArk Vault […]

Read More

Cyber Security Manager Salary vs Consultant Costs

Cyber Security Manager Salary is obviously a primary consideration when hiring an in-house, full-time security team. But is a full-time employee a better solution than outsourcing a security consultant? It makes sense to compare the costs and benefits of full-time employees, versus outsourcing a managed security service provider. Often an MSSP can offer a better […]

Read More

The Guide to Biometric Voice Authentication

Biometric voice authentication is a great option for specific identity management and sign-on circumstances. Here’s a guide to when and why we recommend and implement voice authentication for clients. What is biometric voice authentication? Biometric voice authentication uses your voice to verify account identity. Everybody’s voice is different, based on their own biology (i.e., mouth […]

Read More

The Guide to CyberArk Competitors

CyberArk competitors include Okta, BeyondTrust, Thycotic, Remediant, and Centrify. They’re all Identity and Access Management solutions, and we implement them for clients regularly. What are their main differences, and why should your business choose one over the other? Some competitors are .NET-friendlier, and some simply cost less. Here’s a guide.   What is CyberArk? CyberArk […]

Read More

ForgeRock Features Compared to Okta

ForgeRock features compare similarly to Okta, both are identity management solutions that offer easy implementation. ForgeRock may be better suited specifically for enterprise, while Okta’s modular product offerings allow any size company to begin with Okta, and scale to enterprise capabilities. For example, a mid-size company may choose Okta, and stick with Okta as it […]

Read More
June 24, 2020

The MSSP Guide to AlienVault SOAR

AlienVault SOAR is an automated cybersecurity response product. To be clear, AlienVault is a fully SaaS-driven Security Automation Orchestration and Response (SOAR) solution. AlienVault offers a single event dashboard, the ability to see threads and take action, event management, and extensive monitoring. While there are many SOAR solutions to choose from, we confidently recommend AlienVault, […]

Read More

The MSSP Guide to Centrify MFA

Centrify offers MFA at System Login, which ensures that “only authorized humans are accessing your critical infrastructure.” This is an MFA login that provides access to the Centrify privileged access management tool (PAM) called Centrify Zero Trust Privilege. If you’re looking for a general multi factor authentication tool, then you might prefer Idaptive MFA. Idaptive […]

Read More
June 23, 2020

Why Choose Remediant vs CyberArk?

Remediant SecureONE and CyberArk Vault are both Privileged Access Management (PAM) solutions. Remediant SecureONE is “agent-less, vault-less, and never shared”, while CyberArk Vault takes a “risk-based approach to credential and session management.” What’s that mean? Remediant is a lower-cost security solution that is easier to implement, while still protecting access to servers and endpoints. CyberArk […]

Read More

Gigya to Okta: Why You Should Migrate

Gigya was a customer identity and access management security solution best-suited for retail business and enterprise, because it offered customer analytics and insights. Gigya was acquired by SAP, and is now part of SAP Customer Data Cloud. If your business is considering a migration away from Gigya/SAP to Okta, here’s a guide.   What is […]

Read More

The MSSP Guide to CyberArk Identity SSO

CyberArk Identity SSO is a great identity management solution that we recommend and implement every day. CyberArk Identity does a great job with endpoint security and works particularly well with Active Directory. The primary alternative to CyberArk Identity is Okta, which costs more because it is a more mature product and offers additional features and […]

Read More
June 22, 2020

What Is an Endpoint Solution?

Endpoint solutions are a security measure that goes beyond simple antivirus software to prevent and detect malware attacks. Endpoint solutions secure an endpoint, like an employee’s stolen cellphone, by monitoring systems, detecting a threat, and predictively containing the threat, and then moving forward with remediation (fixing anything that was damaged.)  Here’s a simple guide.   […]

Read More

Okta vs CyberArk Identity: Decide in 3 Minutes

Okta and CyberArk Identity are online security solutions. The intent of both Okta and CyberArk Identity is to give the right people access to the right information and accounts while making it very difficult for hackers and criminals to access accounts. Here’s a quick guide on which is right for your company.   What are […]

Read More