News and Research

Device encryption and compliance

Most companies want to protect data at rest on devices that are susceptible to theft. This will ensure that the data is inaccessible even if the hard drive is removed and replaced in another machine. Yet, lost and stolen... Read More

desktop screen with lock on it

Common mistakes with endpoint encryption

Endpoint encryption is one of the cornerstones to securing data but it can introduce new challenges which can result in costly mistakes. Encryption is the process of changing information to make it unreadable without a proper authentication key. Administrators... Read More

specops software logo

Specops Password Reset price

Do you need a self-service solution to enable employee password resets in Active Directory? You are likely familiar with the cost-savings, usability, and security benefits of our password reset solution, now you need to know how much it costs.... Read More

Which authentication tools are users most comfortable with?

Authentication is the first line of defense in any organization’s cybersecurity strategy, but not all authentication tools offer the same level of security, convenience, or scalability. From traditional passwords to advanced biometric and adaptive authentication, businesses must carefully choose... Read More

Specops introduces Secure Service Desk

Verify user identity at the service desk before unlocking accounts and resetting passwords. Secure Service Desk is a tool that can tell you if callers are who they say they are. Read More