Healthcare Best Practices Guide Healthcare to Strong Identity Access Control

Despite the many 2FA options, the real problem healthcare organizations need to solve is how to defend against the use of stolen credentials without having to reduce security, or having to complicate user routines.

SecureAuth IdP Adaptive Access Control for Healthcare

Healthcare organizations spend millions of dollars each year on traditional endpoint and network security, yet breaches still occur on a daily basis. In fact, 2015 was a banner year for healthcare hacks. The Cyber Security Act of 2015 was a strong response, placing increased pressure on healthcare organizations to implement better access control. Because compromised valid user credentials are used upwards of 60% of the time during attacks, the key to better security is to focus on the identity and treat that identity as the new security perimeter.

IT Decision Makers Reveal Two-Factor Authentication Dislike and Rise in Adaptive Authentication Adoption

Rise in Adaptive Authentication Adoption

 

Findings show 74 percent of respondents who use two-factor authentication admit that they receive complaints

IRVINE, Calif. – Jan. 11, 2017 – SecureAuth® Corporation, the leader in adaptive access control, today announced the results of a survey that reveals challenges associated with two-factor authentication (2FA). Commissioned in conjunction with Amplitude Research, the responses surveyed 300 IT decision makers and cybersecurity professionals on industry perspectives and concerns with 2FA.

Keeping Text Message Multi-Factor Authentication Secure

multi factor authentication with sms protection
Author: 
Jeff Hickman

 

One of the largest challenges that organizations face when implementing multi-factor authentication is user adoption. Balancing user experience against security has always been a difficult task and seems to be getting harder every day for security organizations around the globe. One of the largest hits to multi-factor adoption has been against SMS (AKA Text Message) delivery of One-Time Passcodes.

Improving VPN Security with Adaptive Authentication for RADIUS

Adaptive Authentication for VPN
Author: 
Jim Goodrich

 

At SecureAuth, we know that constant innovation is needed in security to stay ahead of the evolving threat landscape. Recently, we added some crucial features to our RADIUS server support: IP based threat detection, Geo-Location, and Geo-Velocity – all parts of SecureAuth adaptive authentication. The reason is simple, to stop attackers from using stolen credentials to access critical resources like a corporate VPN.

To understand why these features are crucial to a security strategy, let’s look a little deeper into the anatomy of an attack.

Best Practices Guide to Strong Identity Access Control

There’s a reason companies have hired us to strengthen security in the aftermath of some of the biggest breaches in history. We know how to implement strong defenses that stop and contain attacks while protecting IT budgets and delivering a first-class user experience. Here are our recommendations for security best practices, as well as tips on how we build the most advanced security programs on the market.

Top Five Reasons to Replace RSA with SecureAuth

Replace RSA with SecureAuth Authentication
Author: 
Damon Tepe

 

Hundreds of organizations have replaced RSA with SecureAuth. Should you? To help you decide, we’ve put together a quick checklist of the top 5 reasons these customers chose to migrate.

 

Reason 1: 60% lower TCO

The top reason why organizations are making the switch to SecureAuth is total cost of ownership: SecureAuth’s TCO is nearly 60 percent lower than RSA’s.

SecureAuth in the News at IP EXPO LIVE Europe 2016

 

Listen in as James Romer, Chief Security Architect - Europe, is interviewed by IP EXPO Live about SecureAuth. Romer quickly sums up our access control with adaptive authentication solution, "We make sure you are who you say you are - from wherever you are!"

 

Pages