Blog

  • Black Hat Europe Update

    The SecureAuth team attended the Black Hat Europe conference in the beautiful city of Amsterdam.  It was a good show, and we met a lot of people very interested in understanding how to protect their corporate networks and apps. The conference had the usual mix of white hats, hacks, exploits and protection schemes so choosing

  • Single Sign On Authentication

    So you’ve been tasked with obtaining a single sign on solution for your organization. You require something that will streamline access between cloud and web apps, VPN networks, and even native mobile apps. Your users want simplified access, and they don’t want to be bothered with having to remember numerous passwords. For these requirements, a

  • Third Quarter Newsletter

    Third Quarter Newsletter It has been a busy few months for us at SecureAuth, and as we move into the final quarter of the year I am confident that we will close out 2014 in fantastic fashion. During the last quarter, our partner list has expanded; we continued to expand our international presence, our latest release has

  • Poodle Vulnerability

    A security vulnerability affecting SSL 3.0, known as “POODLE”, was recently disclosed to the public. This is an industry-wide vulnerability which affects the SSL 3.0 protocol itself. SecureAuth IdP appliances are shipped with SSL 3.0 enabled to ensure backwards compatibility with legacy customer product, therefore are vulnerable to the POODLE exploit. At this time the

  • Single Sign-on Solutions Explained

    Single Sign On solutions are usually sought because they can reduce IT help desk costs and increase productivity. But there are also security benefits to consider as well. Single Sign On (SSO) can enable users to create much more complex passwords. This assumes that SSO users only have to remember one password, and that most

  • The Identity Issue: October 9, 2014

    The Identity Issue is a monthly newsletter brought to you by SecureAuth. It includes company and industry articles to inform our community of the latest in security news, trends and culture.   A Quick Guide to Authentication for VPNs  Typically utilized to grant wide access to protected resources when outside the organization’s physical walls, VPNs are

  • IDC – Dynamic User Authentication: Smarter Security to Protect User Authentication

    Request a Free Copy of This Report In this paper, Pete Lindstrom, Research Director, Security Products at IDC explores the emerging trends in technology, authentication and the threat landscape that are driving a need for stronger user access control. He then walks through the traditional authentication factors of something you know, something you have, and

  • Intelligent Multi Factor Authentication – The Next Level

    The Borderless Enterprise As organisations grapple with ever increasing challenges around BYOD and information everywhere, the authentication process becomes ever more important as we move further into the realms of the borderless enterprise. Traditional Multi Factor authentication is now recognised as a minimum requirement in protecting an organisation. Inevitably, as measures are put in place,

  • Is SecureAuth Impacted by the “Bash Bug” Vulnerability (CVE-2014-7169)?

    A critical vulnerability has been reported in the GNU Bourne Again Shell (Bash) by security researchers. Known as Bash Bug or Shellshock, the GNU Bash Remote Code Execution Vulnerability impacts GNU Bash versions 1.14 through 4.3. This flaw allows attackers to provide specially crafted environment variables containing arbitrary commands that can be executed on vulnerable

  • Two Factor Authentication for VPN Trends and Use Cases

    According to a story by the Harvard Business Review, contract workers will one day comprise 25% of the total U.S. workforce. But what does this have to do with VPN Authentication? Everything. Another trend is mobile workers. According to Gartner, 89% of companies have a BYOD policy, and the Bureau of Labor Statistics estimates that 24% of