Specops Key Recovery Datasheet
Specops Key Recovery is a self-service solution for unlocking computers encrypted and managed by Symantec Endpoint Encryption. A user who is locked out at the pre-boot authentication screen can use Specops Key Recovery to unlock their computer, without calling the helpdesk. For added security, users can be verified with multi-factor authentication. Download this datasheet for...
Specops Authentication for O365 Datasheet
Specops Authentication for O365 is the ideal solution for organizations that need a simple approach to O365 user management and authentication. Download this datasheet to see how Specops Authentication can decrease O365 administration time, and increase login security.
Specops uReset Datasheet
Specops uReset is the next generation password reset solution by Specops Software. The solution revolutionizes password security by utilizing claims-based identity to provide flexible multi-factor authentication as a means of addressing the password reset security, and flexibility needs of organizations. Download this datasheet for an overview of Specops uReset.
Specops Password Policy datasheet
Specops Password Policy helps you increase password security in your Microsoft Active Directory environment. You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords.
Specops Key Recovery solution overview
Block weak passwords with Specops Password Blacklist
Specops Authentication for O365 solution overview
Enroll and authenticate to O365 using Specops Authentication
Enroll and reset your password with Specops uReset
Specops Password Policy feature highlights
Device Encryption and Compliance
Device encryption is a security mechanism that protects data at rest on an endpoint. By converting information into an unreadable format, encryption technology protects data from unauthorized access. This paper examines device encryption requirements and recommendations set forth by regulatory bodies.
Five common mistakes with endpoint encryption
Endpoint encryption is heralded as one of the cornerstones to securing data and complying with data protection regulations, but it introduces new challenges which can result in costly mistakes. Download this whitepaper to see which common mistakes compromise the benefits of the encryption technology.
The NCSC has simplified their Password Guidance with just seven tips
Recognized as the authoritative voice on information security in the UK, the National Cyber Security Centre (NCSC) is the UK’s newest weapon in securing IT. The NCSC has simplified their Password Guidance with just seven tips. In this whitepaper, we will: Review the NCSC Password Guidance Give you practical tips that can help shape the...