Biometrics Can Give Small Businesses Big Security

By Constantine von Hoffman | August 29, 2018
With all the attention given to “enterprise-level” biometrics, it’s easy to overlook how much they can – and do – help small and medium businesses (SMB). In addition to improving cybersecurity, biometrics are also being used to help manage employees more efficiently and engage with customers more personally. The 2013 release of the Apple iPhone […]
Read More

Two-Step & Two-Factor Authentication: What’s The Difference?

By Sarah Landes | August 2, 2018
When it comes to authentication, there’s a lot of confusion between two-step authentication (2Step) and two-factor authentication (2FA). As a result people frequently use them interchangeably and make decisions about using them for security without knowing their separate strengths and weaknesses. To that end we have created a primer explaining both and the differences between […]
Read More

Some Myths About Biometrics and Privacy

By Constantine von Hoffman | July 25, 2018
Privacy is a big concern when it comes to biometrics. And it should be, just as it should be with anything involving personal information and the internet. However, because biometrics uses records of an individual, people get even more nervous about it. A look at the facts shows these concerns are overblown. One of the […]
Read More

Why Behavioral Biometrics Is The Best Second-Line Defense

By Sarah Landes | June 28, 2018
Every 39 seconds there’s an attack on a device with internet access. Nine billion stolen credentials since 2013. One in nine online accounts created in 2017 was created with stolen credentials. The reason: Over-reliance on traditional forms of authentication which are not nearly strong enough to protect online information. They persist because of user demand […]
Read More

The Importance of Multi-Factor Authentication in Cybersecurity

By Sarah Landes | June 26, 2018
The State of Cybersecurity The internet has been around for decades. It has made so many aspects of life easier. Unfortunately, with all that extra convenience, people are giving up a lot of their personal and professional security. Cyber attacks have increased enough to make headlines on an almost daily basis. Hackers are tapping into […]
Read More

Forget Tokens, Biometric Authentication is the Future

By Ian E. Muller | June 19, 2018
Tokens are the bane of many organizations’ existence. How many times have you gotten to work only to realize you left it at home? And then even if you remember the token you still have to remember your password. Then you have to type in the code before it times out. And it’s not just […]
Read More

Biometrics Can Provide Better Data Provenance

By John Callahan | June 6, 2018
Imagine these scenarios: Insiders at a financial institution place transactions using e-execution and then deny involvement when trades lose money. Regulated individuals share secrets and collude to fix pricing via messaging services. Fraud occurs through re-diverted funds within Treasury departments. Funds are embezzled or redirected for personal gain. Confidential data is accessed for market price […]
Read More

Key Questions You Need to Ask When Buying a MFA Solution

By Ayenna Cagaanan | May 17, 2018
Organizations everywhere are bolstering their cybersecurity plans through multi-factor authentication (MFA). But before making a purchasing decision, you need to carefully weight different factors to ensure you’re selecting the MFA solution that best fits your company’s needs, including cost, efficiency, and ease of integration. Here are three guiding questions you should answer before considering a […]
Read More

Citrix Synergy 2018: Innovation Wanted

By Sarah Landes | May 15, 2018
Citrix Synergy was a fun, informative event. We met lots of interesting people from a diverse set of industries from healthcare to education. The event itself was small compared to some others we’ve been to this year (RSA, MWC), but the steady flow of people asking for demos kept us busy throughout the three days […]
Read More

Why Would I Use a Password to Log Into My Citrix Environment?

By John Spencer | May 8, 2018
Just over a year ago I left Citrix to make it big with an innovative startup. Today, I’m delighted to be heading up the product group for a small company called Veridium, but I’m equally as delighted to be going back to Anaheim next week to see some of the friends I left behind at […]
Read More