Authentication

paper with stars and checkboxes on clipboard symbolizing a NSCS password guidance checklist

Zero to hero: How zero-trust models protect against cyber-attacks

Perimeter-based security models were built for a world where corporate networks had clear boundaries—but that world no longer exists. Modern enterprises operate in hybrid environments with cloud services, remote workforces, and third-party integrations, creating countless entry points for attackers.... Read More

Specops Authentication enrollment data in Active Directory

The Specops Authentication cloud platform is unique in that user data is stored in the customer’s on-prem Active Directory database. Usernames, passwords, and enrollment data/proofs for the various Identity Services provided by Specops Authentication are stored in the customer’s... Read More

How to stop O365 phishing attacks

O365 phishing attacks are are easy - just trick the recipient into giving up their password on a fake login page. Requiring users to authenticate with additional factors is the best way to stop the attack. Read More

Specops uReset and GDPR compliance

With the introduction of Specops uReset (version 8.1 or later) in the Microsoft EU data center, organizations can now choose which instance of Specops uReset they want to use. Specops uReset is a hybrid password reset solution. The cloud... Read More