Flexible Security For Your Peace of Mind
  • Webinars

    5 Best Practices for Enforcing Password Policies

    Passwords, and the users who apply their own passwords, are often the weakest link in any security infrastructure. From using simple, easily cracked passwords to the classic step of writing them down on a sticky note, getting your users to adhere to stronger password policies will go a long way toward protecting your organization. During…

  • Whitepapers

    What is penetration testing? 4 critical steps to address security flaws

    If you are new to penetration testing, it can seem overwhelming and stressful. But, it does not have to be that way. With the right expectations, it can even be a straightforward and beneficial exercise. This whitepaper will provide an overview of the four phases of penetration testing, along with best practice recommendations to walk you…

  • Whitepapers

    Managing users and authentication with on-premises Active Directory for O365

    The move to Office 365 (O365) requires IT departments to make some essential decisions regarding where they want to manage users and how they want users to authentication to O365 e.g. federation, Office 365 multi-factor authentication (MFA), etc. This whitepaper examines Microsoft provided options such as the Office 365 MFA capability and compares them to…

  • Whitepapers

    Meeting Compliance Requirements in Password Security

    It is critical that organisations are able to ensure their password security policies are up to date and up to scratch – so how are organisations keeping up? The Meeting Compliance Requirements in Password Security report, examines the UK password compliance recommendations and what organizations are doing to comply.

  • Videos

    Enroll and authenticate to O365 using Specops Authentication

    Specops Authentication for O365 enhances login security by extending multi-factor authentication to O365. With 15+ identity providers available during authentication, including Duo Security, Symantec VIP, Social SaaS, and various authenticator mobile apps, users will always have a secure way to access important resources.

  • Whitepapers

    IT and Password Security Survey in the UK

    Passwords are undoubtedly weak and vulnerable to attacks yet they remain the number one form of authentication. Due to this, IT departments are tasked to protect them. Specops Software and Ingenium collaborated to conduct an “IT and Password Security survey” in the UK. We asked 206 individuals from 199 unique organizations to complete a questionnaire…

  • Whitepapers

    The NCSC has simplified their Password Guidance with just seven tips

    Recognized as the authoritative voice on information security in the UK, the National Cyber Security Centre (NCSC) is the UK’s newest weapon in securing IT. The NCSC has simplified their Password Guidance with just seven tips. In this whitepaper, we will: Review the NCSC Password Guidance Give you practical tips that can help shape the…

  • Datasheets

    Specops Authentication for O365 Datasheet

    Specops Authentication for O365 is the ideal solution for organizations that need a simple approach to O365 user management and authentication. Download this datasheet to see how Specops Authentication can decrease O365 administration time, and increase login security.

  • Whitepapers

    NIST and compliance: Future-proofing your password policy

    If the multitude of mega breaches have given us anything, it is an abundance of real-life data to shape future best practices. In this whitepaper, we will: Review the Digital Identity Guidelines from NIST Examine its impact on compliance requirements including HIPAA, PCI DSS, SOX, and GDPR Formulate a best practice strategy for future-proofing password…

© 2019 Specops Software. All rights reserved. Privacy and Data Policy