BLOG

aboutus

26-Jul-2021

Use Case-1: Mandatory FIDO2 Authentication For BPO / Financial Institute

Business process outsourcing (BPO) is a method of subcontracting various business-related operations to third-party vendors. Many businesses, from small startups to large companies, opt to outsource processes, as new and innovative services are increasingly available in today's ever-changing.

READ MORE
aboutus

31-Dec-2020

SolarWinds & SuperNova Cyber Attacks

In our last blog, we argued the case for decentralization & passwordless identity in the wake of the SolarBurst & related cyberattacks. Eliminating shared credentials like passwords goes a long way to enhance the zero-trust security posture of any organization. But a complete zero trust identity solution must go well beyond simple user identity.

READ MORE
aboutus

22-Dec-2020

SolarWinds & Related Global Cyber Attacks

The mega cyberattacks that were first disclosed by FireEye & then subsequently by SolarWinds continue to unfold as we write this blog. We are learning more by every passing day & the full damage from these attacks may take time to be assessed We can broadly conclude that the attack surface looks much bigger than ...

READ MORE
aboutus

08-Apr-2020

Distributed Security For Distributed Enterprise

The notion that the ‘traditional enterprise security perimeter is disappearing’ is gaining traction within the infosec community. The ‘traditional perimeter’ assumes that most enterprise data & computing resources are hosted within a pre-defined set of IP addresses; and that resources can be secured by centralized access & encryption technologies.

READ MORE
aboutus

02-Apr-2020

FIDO2 Security Keys for Hybrid Azure AD Joined Environments

The article focuses on the basic configurations that are required for the setup of Passwordless sign in for hybrid Azure environment. Passwordless authentication implementation on Windows 10 devices help enterprises to significantly improve their security and reduce the support costs by using Windows Hello for Business, FIDO2 compatible...

READ MORE
aboutus

16-Mar-2020

Work From Home / Remote Access Securely

Personal computers and the high-speed internet have made it possible for many people to work from their home instead of their offices. Working from home brings joy of escaping from the issues of long commute for the employee besides family members being close by and enterprise feels relatively lesser maintenance costs of the infrastructure.

READ MORE
aboutus

20-Jan-2020

PASSWORDLESS AUTHENTICATION ON AZURE AD

Passwords are hard to remember. Having a list of passwords for all your online accounts and changing them as per the policies at regular intervals is a nightmare. Some users store the credentials in browser password manager or third-party password manager applications almost in plaintext format or with weak encryption techniques.

READ MORE
aboutus

21-Nov-2019

Why biometric-based FIDO2 Security Keys are preferable

ThinC-AUTH offers the most secure and cost-effective identity solution for enterprises. ThinC-AUTH features biometric based FIDO2 tokenization for IAM. Ensurity believes that a biometric-based FIDO2 solution is not only more secure, but also cost-effective in full life cycle. Let us examine the strong rationale for biometric based FIDO2 hard tokens

READ MORE

Speak to a security expert to find out how we can help you. Click here