Category: Password Management
-
What Makes Passwords Secure?
Passwords are hacked in a variety of ways and for a variety of reasons. Sometimes the hacker is someone you know. It could be a “frenemy” who wants to access your information. If so, he or she might be able to guess your password if you use one that’s as obvious as your dog’s name…
-
DUO + Password Management
Did you know that 63% of data breaches involve passwords that are weak, default, or stolen? Identity theft has been on the rise. In 2013 and 2014, these Fortune 500 companies were hacked, resulting in big financial losses: Sony Pictures Entertainment: 3,000 current and former employees were exposed, which cost the company $35 million. eBay:…
-
Avatier Password Management + RSA
Avatier Password Management now works directly in conjunction with RSA SecurID Management to offer an even more simplified yet secured network. Using RSA, users can now reset his or her own password across all of their networks and applications without the help from IT or help desks. This synchronization gives users the power and convenience…
-
Avatier Password Management Now Works with DUO
Avatier now offers integration with DUO for multi-factor authentication (MFA) to Password Management. In addition to answering security challenge questions, users can now select from one or more multi-factor methods to further secure a password reset operation. The integration gives Avatier users the flexibility to use DUO or use Avatier’s existing MFA technology. Using DUO with…
-
Determine ROI with Avatier IAM Solutions’ Built in Cost Savings Calculator
Usually when companies are looking into purchasing Access and Identity Management solutions, it is ideal to analyze output value against allocated funds to figure out total cost savings. Rather than wasting time trying to budget complicated cost calculations, Avatier IAM solutions include a built in Cost Savings Calculator that can be used to determine and…
-
How to Survive from Online Predators using IAM Solutions for Stronger Cybersecurity Measures
Cyber security should be a company’s top priority. Protecting important company information and assets from hackers should start from having a strong foundation. This will require a solutions system that will not only improve risk management and security practices but also detect and prevent any incoming cyber attacks. Avatier Identity and Access Management (IAM) offers…
-
Benefits of Having Single Sign-On (SSO) in your Enterprise
When companies begin implementing multiple applications and other various programs, there will be countless of usernames and passwords that needs to be issued and managed. Rather than dealing with the burden of having multiple usernames and passwords, wouldn’t it be ideal to have to only worry about just one per user? Avatier Single Sign-On provides a…
-
Strengthen Cyber Security and Eliminate Threat of Hackers with Avatier’s Password Bouncer
The security industry has determined that about 70% of all deployed firewalls are not working to protect the networks behind them. With the increasing threat of hackers in today’s world, having a strong defense mechanism is imperative to protect and secure important information. Default password settings usually require the obvious capitalized letter, a random number,…
-
Webster Bank Saw Immediate Results with a 70% Decrease in Password Reset Requests
Webster Bank was founded in 1935 by Harold Webster Smith. Growing from humble roots, Webster Bank has become the leading regional bank in the Northeast and offer a full range of financial services to their customers including personal, business, commercial and institutional banking. They expanded from Connecticut into neighboring states, and continually work toward expanding…
-
A Large Retail Company’s Help Desk Ticket Volume Reduced by 90% With Avatier’s Self-Service Password Reset Solution
Large retail corporations face many challenges in order to maintain a smooth operating procedure. The constantly-evolving environment of cyclical need for more employees during the holidays and a high turnover rate creates a nightmare for the help desk. In 2008, the Director of IT Security of one such retail company knew that he needed to…
-
Reduce Help Desk Calls by 30% with Avatier’s Self-Service Password Reset Management Solution
Users have a multitude of passwords to recall, often due to the fact that password security requirements are not universally the same. There’s the simple go-to password, the slightly more complicated password, the one that passes most security requirements… and then there’s the password that’s asking for your social, first born child, the national anthem,…
-
ING DIRECT Realized its Return on Investment With Avatier’s Password Management Within Six Months
ING DIRECT is the United State’s fourth-largest savings bank and its largest online bank. Their goal is to maintain a very high level of operational efficiency, and security is extremely important. They were looking for a way to institute stricter password policies without increasing the help desk workload. The solution also needed to scale with…
-
Verizon Data Breach Investigations Report and Recommended Security Controls
Best practices for security controls Verizon’s 2016 Data Breach Investigations Report analyzes exploitation data collected last year. Not surprising, the distribution of incidences are similar to the previous year. The top 10 vulnerabilities still account for 85% of successful exploits. With automated attacks yielding incredible success, new vulnerabilities come out daily. With 95% of attackers…
-
HDI Conference & Expo Help Desk Case Studies
HDI Conference peer to peer learning. As far events go, the HDI Conference & Expo is fun. General speaking, security and IT professionals are a serious bunch. On the other hand, help desk professionals have a good time. Don’t get me wrong – It’s a broadening event. From analysts and salt of the earth operators,…
-
FBI Charges State Sponsored Hackers Target Organizations with Weak Password Policies
Strong password policies deter state sponsored phishing. Perhaps you saw the news last week. Three members of a Syrian hacker collective were charged in federal court. The criminal complaints cite multiple computer related conspiracies committed by Amad Umar Agha, Firas Dardar, and Peter Romar. They are charged with targeting Internet sites on behalf of the…
-
Verizon Data Breach Scenarios Stress Identity Management with Multi-Factor Authentication
Strong authentication is cybersecurity’s best defense. The Verizon Data Breach Digest, Scenarios from the Field summarizes over 500 cybersecurity investigations. The Digest informs organizations about security attacks, the methods used and victims. It shows a limited number of techniques describe most incidents. In fact, twelve scenarios represent over 60% of all investigations. The report groups…
-
Self-service Password Reset Authentication Options
Watch Password Management Phone Reset Video Authentication is near. Self-service password reset lets users reset passwords without help desk assistance. As a result, help desk no longer needs to verify users over the phone. Instead, users can confirm their identity through a variety of options. When describing options, enterprise password management vendors focus on the…
-
Passwords to User Provisioning Progression
The password to provisioning exchange Help desk password resets are a costly and unnecessary IT operation. Manual processes are vulnerable to spoofing and they don’t scale. Enter enterprise password management, which enforces strong passwords for elevated security. It also frees up technical staff so IT can focus on more important aspects of their job. An…
-
Last Year’s 25 Worst Passwords Reinforce Strong Passwords Matter
Enterprise security begins with strong passwords. Passwords are the most common way to authenticate access. At home, on the job, and using social networks, applications require passwords. As the systems you log into increase, you assume greater risk. This is true for one reason. Most passwords are weak and in all likelihood, you use them.…
-
2016 Identity Management and IT Security Predictions (continued)
IT security predictions and identity management solutions for 2016. Our initial IT security predictions point to fewer incidents producing greater damage in 2016. This trend begs for an explanation. With fewer breaches costing more, security attacks take on enhanced sophistication. As BYOD and cloud apps reach the workplace, organizations find themselves unprepared. Similar to our…
-
Top 10 Information Security Worst of 2015
Information security under assault While 2014 became known as the "Year of the Information Security Breach," in 2015 privacy got thrown out the window. Fueled by success, cyber criminals were more sophisticated. They used better tools and exploited bigger targets with greater frequency. In response, IT organizations are evolving to view information security not just…
-
How IAM Makes ITSM Better—And Why They Belong Together
Add self-service IAM to your ITSM ticketing system. The goal of the IT organization is to create and protect business value. The "create" element seems widely understood; the IT service management function demonstrates value through the support and delivery of high-quality, cost-effective services that enable the business to meet their goals and objectives. The better…
-
Time to Expire Phishing Strikes and Security Breaches
Detect cyber attacks before they score. In studying timelines of enterprise security breaches, organizations must shift their focus. Rather than firewalls and perimeter defense, the real damage occurs once inside. The longer cyber thieves remain unexposed the greater the cost. The 2015 Verizon Breach Report indicates 45% of attacks are initiated by phishing. As a…
-
EDUCAUSE Annual Conference Universities and Colleges in Need of Self-Service Security
EDUCAUSE Annual Conference self-service password management security At this year’s EDUCAUSE Annual Conference approaches, information security is principal. At universities and local community colleges, ensuring student privacy is so paramount. It is now included in many institutions’ value pitch. They should. According to the 2014 Identity Theft Resource Center Breach Report, Education made up 15%…
-
New Identity Management for the Mobile Workforce Avatier Identity Anywhere (AIMS) 10
Identity management just got mobile. As the global leader and innovator of the most user-centric identity management software on the market, we are proud to announce at the Gartner ITxpo 2015 the release of the Avatier Identity Anywhere (AIMS) 10. As the newest and most powerful upgrade to our solutions used by millions of users…
-
MLB Steps Up to Identity Management Big League
Major League Baseball ushers in a new era of cheating. Baseball, known as America’s Pastime, reflects our national identity, culture and values. The 1967 Major League Baseball (MLB) World Series featured the St. Louis Cardinals. The Series remains one of my earliest memories. On a tree swing in the backyard, I listened to the game.…
-
Avatier Identity Management and Cherwell Software Strategic Alliance Makes ITSM and Enterprise Cloud Computing Better
Avatier announces a Strategic Alliance Partnership with Cherwell Software. Today, at the Cherwell Global Conference, we announced an incredible partnership with Cherwell Software™, a leading IT Service Management (ITSM) vendor, business and workforce enablement system. Our strategic alliance partnership with Cherwell ensures best practices are utilized in the design and implementation of the integration of…
-
Supporting Technologically Challenged Identity Management Customers
Hone in on the right level of communication for customer success. As technology changes and rapidly advances, all of us in identity management support work with customers who find themselves challenged by new and updated technology. As you might expect, a great deal of upset customers contact tech support. Many would rather cling to existing…
-
NSA Map Shows Chinese Government Cyber Attacks on U.S. Targets
Over 600 reported cyber attacks since 2010. In the movie, Tucker: The Man and His Dream, Jeff Bridges plays Preston Tucker. As an entrepreneur, Tucker failed in 1947 to change the automotive industry. As a visionary, he succeeded in advancing automobile design, manufacturing and safety. In one scene, Tucker delivers an impassioned speech to investors.…
-
3 Enterprise Password Management Best Practices to Ensure User Adoption
Self-service enterprise password management operations. An enterprise password management solution benefits an entire organization, from IT and Help Desk staff to end-users. Implementing self-service password management improves help desk efficiency, reduces costs, and enforces strong security. It offers a win-win for everyone assuming you maximize adoption. To ensure high usage, a self-service password management solution…
-
Four Myths of Self-Service Password Reset User Adoption
Myths support false premises I can generally tell how a self-service password reset project will go. Particularly, the ones which will struggle to sustain high levels of user adoption. In many cases, the initial sign doesn’t appear until after a purchase. It’s when the team involved in the evaluation and selection process drops down to…
-
ServiceNow Knowledge15 Looks to a Service Management Future
ServiceNow Knowledge15 focuses on fast easy enterprise-grade. In watching Frank Slootman, ServiceNow CEO and the Knowledge15 keynote speakers, you really do glimpse the future. The future of "Everything as a Service." For most enterprises, service management represents the state of operations in 2020. For some, particularly small and medium sized business, service management represents operations…
-
Announcing the Avatier Identity Management Support Wiki
Introducing the Avatier Identity Management Support Wiki You never know what you are going to get when walking into a new job…this is especially true when coming in as the leader of Technical Support. The interview process more than likely covers how fabulous the team is, how "mature" and "dependable" the product is and –…
-
The True Cost of Password Resets
User enrollment exposes a password manager’s true cost. Recently, I found myself in a discussion about the true cost of a passwords reset. Ironically, I was in a position where I had to defend spending more as part of a strategy to lower Help Desk requests and operational costs. In comparing software to software, the…
-
What Will Your IT Security Get For The Holidays This Year?
IT Security gifts for the Christmas holidays. Happy Holidays! At least we’re all hoping they are going to be happy. With cybercrime and cyber terrorism on the rise, we’ll be lucky if we don’t get coal in our cyber stockings this year — especially if they already have cyber holes in them. According to a…
-
12 Identity Management Side Dishes to Avoid this Thanksgiving
Identity management recipes for disaster. Thanksgiving is a wonderful American holiday. It involves being thankful for family, football, shopping and eating. For an idea of American’s love for celebrating this holiday, forty-six million turkeys are stuffed, eighty million pounds of cranberries sauced, forty million green beans casseroled, twenty million pounds of potatoes mashed, and fifty…
-
The Dropbox Security Spoof and Password Reuse Caper
Dropbox security spoof exposes enterprise vulnerabilities. If you don’t know me, you may think I spend all my time writing about security breaches. Believe me I really would like to stop writing about them. I do hope organizations start paying attention. It just seems breaches are more pervasive. They are in the news more often,…
-
Improving Password Security Shouldn’t Be Rocket Science
Password security blueprint. It amazes me that, despite all the money being spent on security measures, from endpoints to data leak prevention to database security, the single largest vulnerability continues to be passwords. To be specific, 76% of all breaches over the past few years were based on weak or stolen password credentials according to…
-
The White House Wants To Pass On Passwords. Can we?
It is very positive news that the government is focused on improving authentication and identity management beyond the old-school usage of passwords, a huge security flaw in any enterprise system. After all, a typical eight character password has 6.1 quadrillion possible combinations. So we can feel pretty safe, right? Wrong. Just three years ago, it…
-
UC Berkeley Web-Based Password Manager Examination
Web-based password managers. As you know from my blogs, I am an opponent of cloud single sign-on and password management services. At least at this point in time, I cannot think of a worse idea. What I am about to say will not always be true. It is true today. Any enterprise managing identities and…
-
EBay Privileged Account Management Auction
eBay privileged account management feedback. I must confess. I am a little surprised by the media’s response and coverage of the eBay information security breach where hackers gained access to the personal data of 145 million customers over a four month period. During this time, cyber criminals accessed a database containing customer names, their email…
-
ITSM Solutions and IAM Solutions Are Not Mutually Exclusive
At last an ITSM IAM shopping cart. As ITSM professionals soak up the knowledge from ServiceNow’s Knowledge14 conference, it is interesting to see how the service management and identity management worlds are beginning to converge. Gone are the days when IT solutions only addressed specific target capabilities without meeting an organization’s greater needs. Now, identity…
-
The 2014 HDI Conference and Expo Resembled a Sardine Can
The 2014 HDI Conference was packed. Over 2300 IT service and technical support professionals squeezed into the 2014 HDI conference and expo this week in Orlando. There were clearly two sides to the event: thoughtful motivation and mind expansion mixed with practical information from Expo exhibitors. On the conference side, five great speakers captured the…
-
Attend the HDI Conference with an Identity Management Focus
Avatier Booth 424 With the 24th Annual HDI conference and Expo nearing, I thought it would be wise to remind everyone about the importance of thinking holistically when choosing solutions that can help improve service desk operations. While a variety of ITSM solutions are on display, there will also be a focus on identity and…
-
A Shamrock Debunks Three Single Sign-On Software Myths
SSO lucky! When I tell people I work for an identity management company, a common response I receive is “Oh, you mean single sign-on?” For this reason, I have come to believe single sign-on or SSO is the “cola” of IT security lexicon. I say this because similarly SSO is often used as a catchall…
-
Avatier Packs Major Identity Management Changes into AIMS 9.5
Liftoff! This month the company launched the latest version of its Avatier Identity Anywhere (AIMS) providing several significant additions. AIMS 9.5 now includes SMS self-service password reset, a new patented approach to increased IT store intelligence, and revolutionary risk mitigation throughout. Enterprise Password Management AIMS’ Password Management module now features SMS two-factor authentication without requiring…
-
2014 RSA Conference Three Big Easy Wins
Security engagement. Some equate the annual RSA Conference to the Lollapalooza of information security events. I don’t always agree with this premise. However, this year’s conference was exceptional. Perhaps it’s San Francisco or maybe the times we live in. This 2014 RSA Conference did not disappoint. It delivered a full week of pomp, regalia and…
-
Organized Cyber Crime Target
Cyber criminals target retailers. Perhaps you saw the report by the US security firm iSight Partners concluding the stolen customer data now reaches as many as 110 million Target consumers. According to the report, the cyber crime began in Texas stores. Customer data was collected for over two weeks. And, the information was immediately sold…
-
Identity Management and IT Security Practices to Prevent Target-like Cyber Theft
IT security alerted. Last Friday near the end of day I thought I would speak to one of our engineers about this blog topic. Coincidentally, 5 minutes into our conversation, he received an alert indicating unusual resource consumption on our blogging server. Upon examination, someone accessing our login page from a server in New Jersey…
-
Have A Hacker Over For The Holidays
Cyber Carol ‘Twas the night before Christmas and all through the house, many creatures were stirring while holding a mouse. Their stockings were hung by computers with care, in hopes that their breakins soon would be there. It turns out you don’t really need to invite a hacker over for the Holidays… they’ve invited themselves.…
-
NEW PHASE IN AVATIER GROWTH
Avatier LANDESK Partnership. Today we announced a tremendous new partnership with LANDESK Software. It is our first OEM relationship and represents a dramatic new growth phase for Avatier. LANDESK will be using our innovative self-service password reset tool as part of their LANDESK Service Desk in their Password Central product. Our enterprise password manager will be integrated…
-
THE VIRTUAL VOYEUR
Attendance recommended. Participation a must. I’m not there and I should be. Time is money and I don’t have enough of either. So what’s the answer? One of the nation’s top conferences has figured that out. EDUCAUSE, the premier IT conference for the education industry, is in full swing this week with over 400 educational sessions…
-
Are Your Self-Service Password Reset Security Questions a Challenge?
Strengthen your security challenge. Self-service password reset and password management software eliminates countless headaches within your organization while improving information security. Business users are empowered to manage their own accounts in real time, and your IT Help Desk avoids a steady stream of routine, unnecessary service calls costing about $13 per request according to industry experts.…
-
An Apple of a Password Management System for Extending the Walls of the Classroom
One password management system for students, alumni and staff. When you say the word ‘school’ or ‘class’ for many, the image of ivy covered halls or a room filled with posters of scientists, philosophers and historic figures immediately come to mind. If you ask someone to describe a school or a class they particularly enjoyed,…
-
Eeek! The Breach Sheet ‐How Your Enterprise Password Manager Can Keep Your Company Out of the Headlines
Enterprise password manager headlines. In an August 2013 article published in Tech News World on hacking, the author included a "breach sheet" describing a host of recent security breakdowns and associated consequences — a sobering reminder of what can happen as a result of substandard enterprise data access management security protocols. How do you keep…
-
Power to the People: Why Self-Service Password Reset Software is a No-Brainer
Password reset 1-click away. It’s 9 AM in London, and you’re sitting in your hotel room logging on to check your email and give your presentation a final review. You’re expected at the prospect site in an hour, and you think you’re ready to go — that is until you realize that you can’t log…
-
Help Desk Horrors: Why Enterprise Password Management Must Be Automated
Classic access management software. The SANS 2013 Help Desk Security and Privacy Survey revealed nearly half of enterprise Help Desks operate with serious gaps in security controls — a full third of the IT professionals polled described risk management and security awareness training for Help Desk staff as “weak” or “non-existent.” When you consider that the…
-
Data in Danger: Leverage an Automatic Password Reset Tool to Protect Privacy
Automatic password reset tools. Smart companies and agencies know that information security is a cornerstone of trust and that effective password management is the first line of defense against breach. What too many of these entities don’t realize is that the most effective password management solutions include an automatic password reset tool with self-service capabilities.…
-
The Lowest Hanging Fruit: Why Self-Service Password Reset Software Makes Dollars and Sense
Self-service password reset software cuts costs. When you’re a C-level executive, it’s your job to allocate budgets on a macro level. As part of this process you’re evaluating risk, ROI, and how long it will take to break even. You’re rightly focused on defining strategic direction for your organization and don’t get bogged down with…
-
Conquering the Top 5 Corporate Password Management Stumbling Blocks
Corporate password management hurdles. When it comes to multi-user corporate password management, even the big boys miss the mark. You’d be surprised at how many sophisticated, large scale companies store administrative passwords for servers, network switches and routers on an Excel spreadsheet in a “secure” folder where members of the IT staff can access them…
-
Proactive Self-Service Password Management: Educate Employees and Automate Compliance
Password management education. Your employees are your greatest asset — and potentially your greatest liability. Laptops stolen at the airport, smart phones lost at conferences, data accessed through insecure wireless networks — all of these seemingly unintentional and innocuous instances add up to huge cyber security risk. When you contemplate the possibility that your employees’ personal mobile…
-
Rethinking Enterprise Password Management
Lock down password reset policy enforcement. It seems inconceivable that 9 out of 10 supposedly secure passwords are susceptible to breach. However, in May, 2013, Deloitte published a study in www.computing.co.uk titled “Ninety Percent of Passwords Are Vulnerable to Hacking”. How could this be and how does this finding impact your enterprise password management strategy?…
-
Eliminate Password Reset as the #1 Drain on Your IT Resources
Cut costs with password reset software. The phone rings and it’s Carol from accounting. She can’t run payroll because her password isn’t working. And then there’s Jim from marketing. He’s got a big presentation to deliver in 20 minutes and he can’t access his file. Daniel in sales can’t get to the shared directory to snag the collateral…
-
Don’t Be Apple — 5 Steps to Make Password Reset Software Fruitful
Password reset enterprise security. Password reset software is essential to a company’s ability to maintain the security of its information, but if not mapped out properly, the solution itself can yield an entire crop of vulnerabilities. This was a lesson learned the hard way by Apple last month. As reported in The Verge, Apple was…
-
How to Get Bang for the Buck Out of Your Self-Service Password Management Solution
Reduce costs by enabling business users. One of the biggest bang-for-your-buck purchases in the security world is still an enterprise-class self-service password management software solution, yet many organizations are still struggling with the volume of password-related service desk tickets even with a self-service password management solution installed. The problem in most situations boils down to…
-
Boldly Go Where No Enterprise Password Management Has Gone Before
Self-service password management… makes it so. With the possible exception of IT personnel and CSOs, when most officers in an organization hear the term “Enterprise Password Management” they think “why should I care?” To them, enterprise password management software and self-service password reset software are like the unaccredited, red-shirted crew members on the USS Enterprise…
-
Say It Isn’t SSO" Deploying Single Sign-On Enterprise Password Management in 5 Easy Steps
SSO enterprise password management. The security software on my home computer has an appreciated yet annoying feature that is intended to enforce password management upon me in spite of myself. Whenever I visit a new site that requires a password — and it seems all sites require passwords these days whether any financial transaction takes…
-
Self-service Active Directory Password Reset for a DIY World
Active directory password reset barriers. It’s a strange duality of today’s society that as things become more automated, people are seeking ways to get back to “doing it yourself”. We see this manifested in the form of an entire network on cable TV devoted to “do it yourself” (the DIY Network). We’ve also seen it…
-
Help Desk Password Reset Software: 5 Ways Orgs are Taking Care of Business
Take off with help desk password reset software. Today’s business places some mighty widespread demands upon Identity and access management systems. They need identity management solutions with help desk password reset software that can perform automatic user provisioning and password reset ticketing. For decades, organizations have passed along responsibility for their identity management password reset…
-
Making the Case for Password Reset Software: The 25 World’s Worst Passwords
Password reset software rules. Those who believe Oscar Wilde’s statement that “Art imitates life” need look no further than the Mel Brooks’ futuristic comedy classic, Spaceballs (one of my favorite comedic classics of all time), to acknowledge the need for password reset software. At one point in the film, the movie’s villain, “Dark Helmet,” uses…
-
Cyber Security: How to Cover Your SaaS
Reach for SaaS cyber security. While attending various conferences, roundtables and other information security gatherings, a common theme that often presents itself is the concern over security of software-as-a-service (SaaS) vendors. Another common theme seems to be that IT cyber security teams are either very confident with how they are managing this particular “cloud” risk…
-
Top 10 Cyber Security Software Hacks on Santa’s 2012 Most Naughty List
Top holiday cyber security hacks. Here we are, one year older and one year wiser when it comes to cyber security software, but unfortunately it seems those who mean to undermine cyber security systems have also grown. While there seemed to be a lot more high profile attacks on government and private business in 2011,…
-
How to (Quickly) Close the Door on Cyber Security Threats
Cyber security threats shut out. In today’s age of IT cyber security threats, there are always new risks that need to be monitored and accounted for, but all of the old threats still need to be top of mind as well. Information security is a function where new responsibilities continue to grow and where old…
-
A Corporate Cyber Security Risks Wish List
IT security greeting. God rest ye merry IT men, let nothing you dismay; Remember hackers’ prime season began on Black Fri-day… While Avatier shows off its new access certification tool, Compliance Auditor, at the annual Gartner Identity and Access Management (IAM) Summit next week, a special group of people around the world is busy preparing…
-
BYOD Compliance Risk Management 4 the GOV?
BYOD compliance and risk headaches. When it comes to government, everybody talks about the “movers and shakers” — the people who make things happen. When it comes to technology in government today, though, the thing that’s “moving” is the growth of mobile use and what is “shaking” that up is the rapid increase of BYOD…
-
KuppingerCole ‘Compass’ Points to Identity Management Software Innovator
KuppingerCole recognizes innovation. Innovation is one of Avatier’s core values and a key to its cyber security strategy in identity management software. But it’s one thing to tell people you’re innovative; it’s another thing all together to have an expert in the identity management software field confirm it. That’s what happened last week when KuppingerCole,…
-
Don’t Pass on Enterprise Password Management
Enterprise password management bottom line. In today’s age of technology, where new functionality comes out almost weekly, it is easy to get caught up in the latest gadgets, gizmos and apps. Unfortunately, when it comes to the realm of IT cyber security — and enterprise password management in particular — all the gadgets, gizmos and…
-
Reviewer Calls Avatier’s Identity and Access Management Software Suite ‘A Remarkable Offering’
Best identity manager. SC Magazine, one of the most highly regarded publications covering the IT cyber security space, recently published a review of Avatier’s Identity and Access Management (AIMS) Software Suite. The suite, which is Avatier’s main identity and access management software product and incorporates products for user provisioning, password management, governance risk compliance, and…
-
The Pros and Cons of an Enterprise Password Management Software Policy
Enterprise password management measures up. Many companies simply turn on enterprise password management software and use policy defaults without giving it much thought. The reality is that a poorly thought out Password Policy may be hindering IT cyber security while increasing Help Desk costs. This is exactly the opposite of the intended purpose. The three major…
-
Self Service Password Reset Phishing Expedition Flops at Black Hat
Password phishing slight of hand. It seems even our industry’s best and brightest at last week’s Black Hat conference fell for a not very well executed phishing campaign. Approximately 7,500 attendees received a fake self service password reset email, sent to the accounts used to register for the conference. The attempt was so weak that it’s…
-
Passwords: The Drug of Choice for Cyber Security Thieves
Rush to steal passwords. Last week, Experian announced that more than 12 million pieces of personal information were illegally traded online by identity thieves during the first four months of 2012, up from 9.5 million pieces illegally traded in all of 2010. Cyber security risks are appalling, but unfortunately not surprising. This was the principal result…
-
When It Comes to a Passwords and a Password Management System, Captain Kirk Is Not Your Friend
Password management embarrassments. As if corporate IT cyber security teams needed another headache, last Thursday, it was Yahoo that reported the theft of approximately 450,000 Yahoo user’s email addresses and passwords from their password management system. These were not just to Yahoo accounts, but those of other companies as well. The email information was stored on…
-
With Self-Service Group Management Birds of a Feather Rarely Need to Stick Together
Self-service group management alignment. Unlike flocks where the group stays together while on their way to migrate South, groups inside companies are constantly changing. They pop up regularly for long and short-term projects, add or delete members on a regular basis and always have, hopefully, a sunset clause. To set up manual rule based group management…