Blog

Niraj Manglani | Tuesday, April 6, 2021
Having device context is critical to enforcing security policies at your organization, especially with the accelerated adoption of remote work. Now there’s a way to gather security context from managed and unmanaged devices in a single solution so you can make secure access decisions.
Katie Wah | Wednesday, November 18, 2020
There’s a large base of Microsoft ADFS customers that wanted passwordless authentication for their workforce, and now they can get that and more granular access controls.
Katie Wah | Monday, October 19, 2020
Passwords are a pain, they’re both a massive security risk and an operational inconvenience for admins and users alike, but when we eliminate passwords, what do we replace them with?
Dylan Press | Thursday, September 3, 2020
The reasons why your 4-digit PIN code is more secure than your 12-character password.
Patrick McBride | Thursday, August 20, 2020
What does authorization and visibility look like in the new cybersecurity perimeter?
Patrick McBride | Monday, August 17, 2020
How does the new cybersecurity perimeter affect authentication?
Dylan Press | Tuesday, August 11, 2020
81% of security incidents were tied to weak or stolen passwords. Are there better ways to authenticate?