7 Top Tools for Single Sign-on
Okta, OneLogin score high in test of solutions that beef up app security and cut help desk calls.
Okta, OneLogin score high in test of solutions that beef up app security and cut help desk calls.
New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.
I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
Peak and Tibbr are two tools that teams can use to help track projects and improve workgroup communications.
Three new services -- Flow, Glip and Slingshot -- try to enhance the ability of teams to converse and collaborate using a variety of tools.
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
These four products represent different approaches to VM security
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.
Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.
How to tell if your Facebook, Twitter and LinkedIn efforts are paying off
As businesses make more use of social networks, the number of engagement, analysis and monitoring tools has exploded. Enterprises are trying to understand their return on social media investments, to find out if their Twitter and Facebook marketing campaigns are actually delivering customers. They want to track social mentions across multiple networks and be responsive to both kudos and complaints.
We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes.
As more people telecommute, having a reliable way to connect via desktop video conferencing takes on greater importance. And for employees working in the office, Web-based meetings are a cheaper and less time consuming alternative to business travel.