Posts tagged with "IAM"



Demystifying Cybersecurity: Goodbye Passwords, Hello Passkeys?
Blog | Endpoint Protection · 10. July 2023
Passwords have been used for decades to protect all types of information, but there are many challenges associated with them. Password fatigue, the feeling from employees of being frustrated by the numerous passwords one needs to remember for different accounts, poses a challenge for enterprises as it can lead to users resorting to weak or reused passwords, compromising security, and increasing the risk of unauthorized access and potential data breaches. Securely managing many user passwords...

Solution Highlight: DRACOON
Blog | Endpoint Productivity · 30. January 2023
What is DRACOON? DRACOON is an Enterprise File Sync and Share (EFSS) solution developed in Germany, providing a secure data center for corporate and classified data.

Demystifying Security: Enterprise File Sync and Share (EFSS)
Blog | Endpoint Productivity · 11. January 2023
What is the challenge? Until recently, the easiest way to share documents or files with other employees was either using a USB drive (for large documents) or sending them by emails, if size allowed; email was also the option of choice when sending documents to external contacts. For larger documents, external providers like WeTransfer were used to temporally hold the file for the recipient to later retrieve and download.

Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

Accountability in your digital workspace
06. October 2020
As we wrap up our blog series on 7 things you can do to improve your mobility ecosystem, we would like to leave you with this final thought: the success of your digital workspace is predicated on the effort from across your entire team – from the front-line resources in their daily leveraging of the mobility solution, to your back office team consuming the data generated throughout the business and contributing to its agility. At the end of the day, the singular goal for the organization is...

ISEC7 SPHERE
29. September 2020
As we saw in our previous article about Multi-Factor Authentication (MFA), one of the key parts of security is ensuring the identity of the users accessing your corporate resources. This can be combined with other well-known technologies like Single Sign-On (SSO) to make that process not only as secured as possible but also as simple and transparent for the end-users, so they are not tempted to use easy and weak credentials.  But identity is just one piece, considering that once identified,...