Rob K

November 17, 2017
by Rob K
0 comments

Access Control|Contextual Authentication

  Access control is simply controlling entry into a cyberspace as previously explained in this blog. For example, you have to have a password to access your Facebook account. This password requirement is access control. Without it, anybody could access … Continue reading

Christopher Perry

October 21, 2016
by Christopher Perry
2 Comments

Solving The Dangers of SharePoint Remote Access

SharePoint remote access is not a one-off consideration. Regardless of the platform, remote access always comes with security considerations. With SharePoint being utilized in so many different environments, it is important to understand the dangers of SharePoint remote access. In … Continue reading

March 31, 2016
by PistolStar PortalGuard
0 comments

Balancing Secure Authentication with Technological Convenience

Secure Authentication is just one benefit to the many recent advances in technology that have taken hold.  Technology has been changing the landscape of society for decades and will most likely continue to do so at an exponential rate from … Continue reading

Christopher Perry

June 5, 2015
by Christopher Perry
0 comments

Contextual Risk Based Authentication | Trust but Verify

  That’s a pretty old saying – Trust, but verify. Depending on your age, or your own personal interests; that saying might mean something different to you than it does to somebody else. It has become a staple in any … Continue reading

Rob Bellefeuille

April 27, 2015
by Rob Bellefeuille
0 comments

Data Protection Best Practices – 3 Easy Steps

    Protecting your data is important. Can you imagine living in a house with no locks on the doors or windows? What about leaving your brand new car running unattended while you go in and grab a soda from … Continue reading

Rob Bellefeuille

April 24, 2015
by Rob Bellefeuille
2 Comments

Who is behind the Keyboard: Contextual Authentication

    Have you ever asked yourself this question before? The MTV TV show Catfish asks this question in every single episode. They work with people all over the United States that have fallen in love with someone they have … Continue reading

Gregg Browinski contextual user authentication

April 15, 2015
by Gregg Browinski
1 Comment

Bluetooth Two Factor Authentication Alternatives | Contextual Authentication

My family bought a new, 2015 Subaru this year. In a market as competitive as automobile sales, car manufacturers are continually looking to one-up each other by adding more technology and integration options. A perfect example was our test drive. … Continue reading

Main menu