Stockholm, May 15, 2019 – Specops Software announced today the release of Specops Password Policy 7.1. The release introduces length-based password aging which correlates the password expiration period with the length of the password – the longer the password,... Read More
Specops Software Blog
What are the benefits of Full Disk Encryption
Encryption at the hardware level is great addition to any security portfolio, but it must be enabled with care and consideration. Read More
CEO series: Are there any consequences for ignoring IT security?
Are there any consequences for ignoring IT security? A month doesn’t go by without new reports of companies and organizations suffering from data breaches. Unfortunately, this is just the beginning. The frequency of data breaches is on the rise,... Read More
How to change user passwords in Active Directory
We often get asked how our self-service solution changes passwords on a user account in Active Directory. It’s a more interesting question than it sounds as there are many processes at work here, and many ways to do it.... Read More
Specops Authentication enrollment data in Active Directory
The Specops Authentication cloud platform is unique in that user data is stored in the customer’s on-prem Active Directory database. Usernames, passwords, and enrollment data/proofs for the various Identity Services provided by Specops Authentication are stored in the customer’s... Read More
Specops Authentication Client and Duo Authentication for Windows Login
The Specops Authentication Client provides enhancements to the Windows logon experience by wrapping the built-in Windows credential provider (GINA). This includes allowing users to reset their passwords from the login screen, as well as enhancing the feedback users receive... Read More
Specops launches self-service encryption key recovery
Stockholm – Specops Software announced today the release of Specops Key Recovery. The solution addresses the common occurrence of encryption device lockouts by enabling users to unlock computers encrypted or managed by Symantec Endpoint Encryption. Rather than calling the... Read More
What is a password dictionary attack?
A password dictionary attack is a brute-force hacking method used to break into a password-protected computer or server by systematically entering every word in a dictionary as a password. Read More
Cyber Essentials Password Policy
Passwords play an important role in the Cyber Essentials scheme. If you are planning for Cyber Essentials accreditation, you will need to make sure your password policy is up to the challenge. Read More
Identity verification best practices
Identity verification must consider the level of access being granted, the type of data being accessed, and the action being performed. Read More