| Security Market Segment LS |
|---|
Security vendor WatchGuard Technologies' AuthPoint Total Identity Security bundles AuthPoint multi-factor authentication with dark web credential monitoring capabilities and a corporate password manager.
Delivered via managed service providers,AuthPoint Total Identity Security includes multifactor authentication with single sign-on, dark web monitoring of newly acquired credential breach databases, password management (with browser extensions for Edge, Chrome, Safari and Firefox; plus apps for iOS and Android), a corporate vault for credentials for applications where SSO is not enabled or credentials must be shared, and a private vault for an employee's personal and social apps (with support for exporting these credentials when the employee leaves the organisation).
"Stolen or leaked credentials are a primary cause of data breaches, yet passwords remain the most prevalent method of user authentication for organisations," saidWatchGuard president of identity Carla Roncato.
"And while multi-factor authentication [MFA] has become a mandatory requirement for organisations, most still need to deal with weak and reused passwords, shared admin passwords, credential leaks on the dark web, and corporate applications with limited MFA support. AuthPoint Total Identity Security provides advanced password management capabilities and dark web monitoring to help protect corporate credentials in addition to MFA and web single sign-on."


Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.
Spot on Ms Roy. Along with this goes the trend to short, job ready courses at universities, expounded once by[…]
That MSI dragon laptop looks cool! But $11,799 ....... :O I might think on a bit longer :)
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]