Balancing simple access with robust security

The days of securing a computer, application or website with a basic username and password are long gone. Hackers are more sophisticated than ever and the value of data is on the rise. To this end, advanced authentication, or multi-factor authentication, is becoming the norm. Advanced authentication adds an additional layer of security to the standard username and password, which is needed not only to protect data, but also to comply with strict regulations such as HIPAA, PCI-DSS, SOX and FERPA, to name but a few.

Where things get tricky with advanced authentication is when it affects the ease of accessing information. We live in a time where technology is centered around 'user-friendliness'. Thus, finding the appropriate balance of security and access can be tough. If the login process is overcomplicated, it results in unsafe situations – such as sticky notes with passwords on the monitor - as well as frequent calls to the helpdesk to reset a forgotten password and unproductive downtime while a user waits for a password reset. Conversely, if an organization experiences a data breach, they lose the trust of their customers and may have to pay out enormous fines for breaching compliance regulations.

The good news? You don't have to choose between access or security anymore. You can secure your data, adhere to compliance pressures and keep access simple for the user. With IDaaS products such as HelloID, administrators can customize the factors of authentication required on a per user, per app and per group bases. Some groups with advanced rights, such as admins, can be configured to require extra factors of authentication as the data they have requires additional security measures. User groups that have access to less sensitive data can be configured to need lower levels of authentication to gain access; sometimes a simple username and password may suffice. Configuring on a per app basis is also becoming increasingly popular. Apps such as QuickBooks that contain sensitive financial information can be configured to require advanced authentication, regardless of which user is accessing the data. Additional factors such as time of day, location and device type can also be criteria for consideration.

Enjoy the win, win of robust security and simple access with HelloID.

Battle of the email solutions: exchange vs. google apps

In the industry I am in, with the job functions I perform daily, I see more and more organizations moving from an in-house email solution such as Exchange to cloud-based email solutions like Office 365 and Google Apps. This is due to many reasons and an easy way to see why is to compare Exchange and Google Apps.

Read more

Category

Authentication Management

automated account management, cloud based email solutions, Compage Exchange and Google Apps, compare cloud based email solution, compare email solutions, Exchange, Google Apps

How to manage credentials the easy way

A seemingly simple, yet tedious task for anyone in the information technology field is credential management. End users are given usernames and passwords for various systems in an organizations environment, and the hope is that the end users can manage these credentials with very little issue or assistance.

Read more

Identity and Access Management vs. Identity and Access Governance

Identity and access management and identity and access governance are two terms which are often used in the tech world, which can be quite confusing. What do they mean? Are they the same thing? What do they encompass, and what can they do for my organization?

Read more

Category

Authentication Management

account management, IAG, IAM, What is Identity and Access Governance?, What is Identity and Access Management?, access governance, RBAC, SSO

Account Management in Education: How Can It Be Improved?

Many school districts and even some higher-learning institutions have their technological infrastructure run by a skeleton crew due to things such as politics and budgetary constraints. Situations such as this can often lead to many issues within the organization: Lack of network resources for end users Inability to properly support end users and systems No time to research and implement newer technology This causes frustrated overworked admins to think outside the box and turn to other solutions, such as software-based, automated or semi-automated identity management.

Read more

Category

Authentication Management

Account Management in Education, Automated Provisioning in Education, WFM in Education

Group Policy Object; What is it and how can it allow for seamless deployment of software

In any organization from a small business to a large enterprise, control over user’s access to various resources on the network is a key component of managing the corporate environment. Access to resources such as network shares and printers to things such as settings on local stations, are just some of the items an administrator wants to manage centrally and cohesively. A common method to manage domain resources like this is via Group Policy in Active Directory.

Read more