Stockholm, March, 25, 2020 – Specops Software released the latest version of its Specops Authentication platform. The platform secures self-service password reset, password change, and encryption key recovery with multi-factor authentication (MFA). The introduction of the Okta Verify authentication... Read More
Blog
New data unlocked in Specops Password Auditor
Stockholm, March 24, 2020 – Specops Software released today the latest version of Specops Password Auditor, a free tool that system administrators can use to scan their Active Directory for password-related security vulnerabilities. This latest release unlocks previously hidden... Read More
New job creation from foreign investment in the UK 2020
Foreign Investment in UK Foreign investment in the UK is very important for the performance, growth and success of various economic variables. This being especially true for employment. With Brexit causing a lot of economic and political uncertainty, it... Read More
OS deployment for remote scenarios
Do you need to deploy operating systems and applications to new devices? If you have purchased equipment to support a remote workforce, Specops Deploy will enable zero touch deployment, and reduce your deployment time. This blog will explain how you can enable a remote... Read More
Specops Software Coronavirus Business Continuity Plans
At Specops Software we are committed to providing a safe working environment for our employees and ensuring business continuity in light of the ongoing Coronavirus (COVID-19) outbreak. We are confident that the Coronavirus will not significantly impact the support... Read More
The European Countries Most at Risk of Cyber-Crime
The severity of cyber-breaches has become more and more intense in recent years; as a result, security experts at Specops Software sought to find out which (Western) European countries are the most cyber-insecure for citizens. To find out, Specops... Read More
Election Security Beyond the Voting Booth
A lot of the focus of today’s U.S. election security discussion is about securing the act of voting itself – things like testing machines, adding paper logs, avoiding internet connections for reporting results, etc. However, if you’re just focusing... Read More
How to configure password expiration notifications
In many organizations, password expiration notifications are not just a recommendation but a necessity to comply with internal policies or regulatory requirements. They help ensure that end users adhere to these rules, maintaining both personal and organizational security standards.... Read More
Using Group Policy to configure BitLocker
How to use Group Policy to configure BitLocker. This is useful for organizations with a compliance mandate to enable encryption for all endpoint devices. Read More
Checking for Pwned Passwords in Active Directory
If you are trying to fulfill a regulation requirement like that of NIST, you might find yourself tasked with attempting to set up your Active Directory environment to check for leaked passwords against an external password deny list. For... Read More