Exploring the SAP HANA SQL Command Network Protocol – Federated Authentication

Exploring the SAP HANA SQL Command Network Protocol – Federated Authentication

We continue our journey into SAP security topics. The following is the third part of a series exploring the HANA ...
Martin Gallo
Exploring the SAP HANA SQL Command Network Protocol – Password-based Authentication and TLS

Exploring the SAP HANA SQL Command Network Protocol – Password-based Authentication and TLS

By Martin Gallo, Director of Strategic Research In this article about SAP security topics, we continue exploring
Martin Gallo
Exploring the SAP HANA SQL Command Network Protocol – Protocol Basics and Authentication

Exploring the SAP HANA SQL Command Network Protocol – Protocol Basics and Authentication

With this post we continue our series about enterprise software and SAP security articles. I will cover the basics ...
Martin Gallo
Why Browser Fingerprinting is Creating Challenges for Identity Security

Why Browser Fingerprinting is Creating Challenges for Identity Security

By Martin Gallo Uniquely identifying the user’s device or browser when accessing an online resource can be ...
Martin Gallo
Revisiting the Old and Looking at New Potential SAP Vulnerabilities

Revisiting the Old and Looking at New Potential SAP Vulnerabilities

This post is the first of a series of articles refloating some old notes about enterprise software, SAP security ...
Martin Gallo
What is old is new again: The Relay Attack

What is old is new again: The Relay Attack

The NTLM (NT Lan Manager) relay attack is a well-known attack method that has been around for many years. Anybody ...
Leandro Cuozzo
Hijacking 2FA – A look at Mobile Malware Through an Identity Lens

Hijacking 2FA – A look at Mobile Malware Through an Identity Lens

1. Introduction In the last weeks, several news outlets reported on a new Android malware variant, that added ...
Martin Gallo

Playing with Relayed Credentials

During penetration testing exercises, the ability to make a victim connect to an attacker’s controlled host ...
Alberto Solino
Kerberos Delegation, SPNs and More…

Kerberos Delegation, SPNs and More…

During the past few years, there has been an increasing amount of research around Kerberos security, leading to the
Alberto Solino
SecureAuth Identity Platform Adaptative Authentication

Identity and Access Management

Empower your digital initiatives with secure access for everyone and everything connecting to your business

Product Features

Adaptive Authentication

Extend verification of a user identity with contextual risk checks

Multi-Factor Authentication

Leverage a broad portfolio of authentication factors for desktop and mobile

Intelligent Risk Engine

Protect your identities with advanced risk profiling analytics

Single Sign-On

Provide app discovery and one-click login through portal or desktop SSO

User Lifecycle Management

Enable admins with strong CRUD capabilities and users with self-service tools

Secure All Identities

CIAM

Customer Identities

Deliver a frictionless customer experience safeguarding user data and privacy

B2E

Workforce Identities

Govern and control access rights for employees, partners, and contractors

Moving Beyond Passwords

Learn how passwords alone no longer provide the appropriate level of protection, nor confidence, required to secure valuable resources

Initiatives

Passwordless Authentication

Reduce the risk of breaches by eliminating passwords

2FA is Not Enough

Block popular phishing and brute force attacks used by bad actors

Protecting Office 365

Extend adaptive authentication and flexible MFA to all apps including Office 365

Securing Portals and Web Apps

Balance strong security and an exceptional user experience

RSA Migration

Transition to a modern identity and access management solution

Industries

Healthcare

Financial Services

Retail

Energy and Utilities

Public Sector

Resources

White Papers

eBooks

Recorded Webinars

Analyst Reports

Innovation Labs

Documentation

Support Portal

Events & Webinars

Events

Webinars

Calculate Your Savings

Lower support costs by enabling your users the control to reset passwords, account unlocks, device enrollment and update profiles

Meet SecureAuth

About SecureAuth

Leadership

Newsroom

Careers

Contact