Why Desktop MFA is Essential to your Endpoint Security
When you are thinking of enforcing MFA on your critical SaaS and on-premise resources, do not forget about logins to your employee laptops and desktops. An employee’s work laptop is a treasure trove for any malicious actor who can get access to it. It may contain – Apps accessible with ... Read More
Comparison of User Authentication Methods on Three Parameters
Evaluating authentication methods based on usability, security and deployability. A plethora of authentication methods exist today to distinctly identify a given user (or another entity such as a system). It all started with the humble password. These days, systems like Apple’s Face ID use a cutting-edge combination of sensors and ... Read More
Go Passwordless with FIDO2 and Web Authentication
FIDO2 authentication can be used as a single (passwordless) strong authentication method, or in conjunction with a local PIN (to prevent access using a stolen key), or as a secondary authentication factor just like U2F. Passwords are a huge pain in the a$$. They have enormous disadvantages: It’s not practical ... Read More
Modernize Access To On-Premise Apps Using an ADC and Idaptive IDaaS
An on-premise Application Delivery Controller (ADC) is a critical piece of any IT infrastructure. It performs critical functions related to high availability, performance, and security of on-premise apps. ADCs started in the 90’s as purely load balancing appliances, and evolved to handle compression, caching, traffic shaping, application security and more, ... Read More

