Specops Password Auditor (free) can scan Active Directory to find accounts using leaked passwords. Other advancements include reporting on accounts without passwords, and accounts with identical passwords. Read More
News and Research
How to deploy a MSI package with Group Policy?
Group Policy Software Installation (GPSI) was once hailed as a great incentive for all organizations to upgrade their NT4 domains to Active Directory. It meant that there was no longer a need for those complex application deployment tools, it... Read More
Healthcare encryption standards
Protecting personal health data from unauthorized access is an essential part of HIPAA. Yet, even with stolen devices causing 45% of healthcare data breaches, many health organizations still don’t have encryption measures in place. Read More
Password expiration policy best practice
Instead of arbitrarily expiring passwords every 90 or so days, why not configure the maximum password age based on the complexity level of a password? Read More
Specops encourages longer passwords with length-based password aging
Stockholm, May 15, 2019 – Specops Software announced today the release of Specops Password Policy 7.1. The release introduces length-based password aging which correlates the password expiration period with the length of the password – the longer the password,... Read More
What are the benefits of Full Disk Encryption
Encryption at the hardware level is great addition to any security portfolio, but it must be enabled with care and consideration. Read More
How to change user passwords in Active Directory
We often get asked how our self-service solution changes passwords on a user account in Active Directory. It’s a more interesting question than it sounds as there are many processes at work here, and many ways to do it.... Read More
Specops launches self-service encryption key recovery
Stockholm – Specops Software announced today the release of Specops Key Recovery. The solution addresses the common occurrence of encryption device lockouts by enabling users to unlock computers encrypted or managed by Symantec Endpoint Encryption. Rather than calling the... Read More
Identity verification best practices
Identity verification must consider the level of access being granted, the type of data being accessed, and the action being performed. Read More
Passwords are the biggest threat to GDPR compliance
Data protection authorities have imposed their first GDPR fine in Germany after a local chat service exposed 330,000 credentials. What will be the consequence of the Collections leak that impacts 2.4 billion usernames & passwords? Read More