The Specops Authentication cloud platform is unique in that user data is stored in the customer’s on-prem Active Directory database. Usernames, passwords, and enrollment data/proofs for the various Identity Services provided by Specops Authentication are stored in the customer’s... Read More
Blog
Specops Authentication Client and Duo Authentication for Windows Login
The Specops Authentication Client provides enhancements to the Windows logon experience by wrapping the built-in Windows credential provider (GINA). This includes allowing users to reset their passwords from the login screen, as well as enhancing the feedback users receive... Read More
Specops launches self-service encryption key recovery
Stockholm – Specops Software announced today the release of Specops Key Recovery. The solution addresses the common occurrence of encryption device lockouts by enabling users to unlock computers encrypted or managed by Symantec Endpoint Encryption. Rather than calling the... Read More
How password dictionary attacks exploit weak passwords
A password dictionary attack is a brute-force hacking method used to break into a password-protected computer or server by systematically entering every word in a dictionary as a password. Read More
Guide to NCSC’s Cyber Essentials password policy compliance
Passwords play an important role in the Cyber Essentials scheme. If you are planning for Cyber Essentials accreditation, you will need to make sure your password policy is up to the challenge. Read More
Identity verification best practices
Identity verification must consider the level of access being granted, the type of data being accessed, and the action being performed. Read More
Fix: A required device isn’t connected or can’t be accessed
We have had a few support calls where customers using Specops Deploy OS are running into trouble while PXE booting computers for installation. The error message is as follows and it appears shortly after Windows PE starts to load.... Read More
Sync passwords between Active Directory domains
There are many reasons why you might want to sync a password between two Active Directory (AD) domains. We commonly see requests from customers who are looking at migrating their users from one domain to another. This could be... Read More
Passwords are the biggest threat to GDPR compliance
Data protection authorities have imposed their first GDPR fine in Germany after a local chat service exposed 330,000 credentials. What will be the consequence of the Collections leak that impacts 2.4 billion usernames & passwords? Read More
How to stop O365 phishing attacks
O365 phishing attacks are are easy - just trick the recipient into giving up their password on a fake login page. Requiring users to authenticate with additional factors is the best way to stop the attack. Read More