Our 2017 Security Predictions

Cybersecurity Predictions on Identity and Access Management
Author: 
Damon Tepe

 

It's that time of year when IT companies all over the world take out their crystal balls and predict oncoming trends for the coming year. What's going to lead adoption? What new security controls will rise to the fore and which ones will fall out of favor? Will this be the year teams solve their most stubborn challenges?

The State of Cybersecurity Survey

Cybersecurity Adaptive Authentication
Author: 
Damon Tepe

The State of Cybersecurity Survey

Ever notice something about surveys? While there are plenty out there about the threats rising on the IT landscape, there isn't always useful information about the controls and techniques leaders are using to stop them. And that's what we really want to know, right? Finding out where other organizations are struggling and where they're succeeding, and how they're approaching attacks, can provide a roadmap to strengthening your own security program.

Improving VPN Security with Adaptive Authentication for RADIUS

Author: 
Jim Goodrich

 

At SecureAuth, we know that constant innovation is needed in security to stay ahead of the evolving threat landscape. Recently, we added some crucial features to our RADIUS server support: IP based threat detection, Geo-Location, and Geo-Velocity – all parts of SecureAuth adaptive authentication. The reason is simple, to stop attackers from using stolen credentials to access critical resources like a corporate VPN.

To understand why these features are crucial to a security strategy, let’s look a little deeper into the anatomy of an attack.

Best Practices Guide to Strong Identity Access Control

There’s a reason companies have hired us to strengthen security in the aftermath of some of the biggest breaches in history. We know how to implement strong defenses that stop and contain attacks while protecting IT budgets and delivering a first-class user experience. Here are our recommendations for security best practices, as well as tips on how we build the most advanced security programs on the market.

Keith Graham Joins SecureAuth as Chief Technology Officer

IRVINE, Calif., July 18, 2014 (MarketWatch)– SecureAuth Corporation today announced the appointment of Keith Graham to Chief Technology Officer. Graham was formerly a principal product manager at FireEye, Inc. where he led the development of endpoint forensic analysis.

SecureAuth Launches IdP 8.0

We are proud to announce the launch of our latest release, SecureAuth IdP 8.0, the first and only complete access control solution.

SecureAuth Appoints Executive Vice President of Worldwide Sales

IRVINE, Calif., Sept. 18, 2014 – SecureAuth Corporation today announced the appointment of Nick Mansour as Executive Vice President of Worldwide Sales to support the increasing demand for SecureAuth’s access control solutions, and to continue the company’s aggressive revenue growth. Mansour will report directly to Craig Lund, Chief Executive Officer.

Risk-based Access Solution From SecureAuth, iZipline taps HID

SecureIDNews - SecureAuth Corp. launched SecureAuth IdP 8.0, an access control solution that incorporates risk-based authentication – analyzing and stopping attackers before they breach your environment. This new functionality aims to enhance the multi-factor authentication workflows that can be built and integrated with existing corporate resources and policies for cloud, mobile and desktop access.

Risk-based access solution from SecureAuth, iZipline taps HID 

eBook: The Basics of Cyber Insurance

Cyber Insurance has been booming in recent years as organizations face growing concerns about the cost of online breaches. But confusion still abounds about what these policies cover that basic business insurance, or other policies, do not. This eBook written by the team at SC Magazine and sponsored by SecureAuth, outlines the basics of Cyber Insurance including what is covered and how good security practices can mitigate risk.

Pages