Flexible Security For Your Peace of Mind
  • Videos

    Blocking weak passwords with Specops Password Blacklist and dictionaries

    With billions of credentials circulating the Dark web, it’s important to block all compromised passwords to prevent credential stuffing and other types of password attacks. Learn how you can block all weak passwords using a continuously updated list of leaked passwords and dictionaries.

  • Whitepapers

    Securing IT in the Digital Landscape: Authentication Strategies in the UK

    Despite predictions of the ‘death of the password’ more than ten years ago, the use of passwords as a single point of security has continued to rise. To effectively secure sensitive data and user accounts, it is vital that businesses move away from a single point of vulnerability and embrace multi-factor authentication (MFA). Our survey…

  • Webinars

    Block weak passwords in Healthcare

    This recorded webinar discusses the challenges of blocking weak passwords and presents an innovative solution. Specops Password Policy can be used to: Meet password policy compliance standards such as NHS and NCSC, Blacklist leaked password lists that hackers are using to gain access


  • Videos

    Specops Authentication for O365 demo video

    The Specops Authentication for O365 demo video highlights the administrator and user interface of the solution. It includes a walk-through of the dynamic multi-factor authentication engine, which helps secure authentication to O365.

  • Datasheets

    Specops Password Policy Business Case

    Specops Password Policy helps you increase password security in your Microsoft Active Directory environment. You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords. Download this datasheet for the Specops Password Policy Business Case.

  • Whitepapers

    Forrester report: Top Consumer Authentication Pitfalls To Avoid

    Today’s consumer landscape is filled with endless portals and accounts to manage relationships and interactions with businesses. Whether they are shopping for shoes or sharing documents for work, they all need credentials to access these services. As the digital presence for businesses continues to grow, so do the demands on user authentication. However, securely authenticating…


  • Datasheets

    Specops Password Blacklist Datasheet

    Specops Password Blacklist is a hosted service comprised of more than 1 billion leaked passwords including the haveibeenpwned list. Download this datasheet to see how Specops Password Blacklist can increase authentication security.

  • Webinars

    5 Best Practices for Enforcing Password Policies

    Passwords, and the users who apply their own passwords, are often the weakest link in any security infrastructure. From using simple, easily cracked passwords to the classic step of writing them down on a sticky note, getting your users to adhere to stronger password policies will go a long way toward protecting your organization. During…

  • Whitepapers

    What is penetration testing? 4 critical steps to address security flaws

    If you are new to penetration testing, it can seem overwhelming and stressful. But, it does not have to be that way. With the right expectations, it can even be a straightforward and beneficial exercise. This whitepaper will provide an overview of the four phases of penetration testing, along with best practice recommendations to walk you…


© 2019 Specops Software. All rights reserved. Privacy and Data Policy