The number of required passwords rises inexorably and for normal users, it is becoming increasingly difficult to remember them all .
As a strategy , the user uses identical credentials for all authentications , easy to remember , but insecure passwords or writes them on to an uncertain place. This is actually required security is bypassed and allows crackers a simple point of attack , such as phishing attacks. Due to this uncertainty secret data can fall into the wrong hands and in the worst case, even a financial loss incurred .
The software abylon LOGON SSO Pro provides a helpful support , without reducing safety. The user must authenticate only once during the Windows application and can be accessed after all credentials stored securely .
In networks with multiple user accounts and credentials can be managed centrally by an administrator. Through the use of hardware tokens ( eg smart cards or USB - Sticks ) the individual employee is no longer in the own real credentials. Thanks to a special software process, the real keyboard and mouse input is locked, so the credentials can not be diverted to clear text fields and thus spied during single sign-on process.
The administrator can change the real access data independently without the token 's to learn again. Individual token 's can also be temporarily disabled or blocked as needed. Complete removal of the token 's from the database makes further use impossible.
Download abylon LOGON SSO Pro
As a strategy , the user uses identical credentials for all authentications , easy to remember , but insecure passwords or writes them on to an uncertain place. This is actually required security is bypassed and allows crackers a simple point of attack , such as phishing attacks. Due to this uncertainty secret data can fall into the wrong hands and in the worst case, even a financial loss incurred .
The software abylon LOGON SSO Pro provides a helpful support , without reducing safety. The user must authenticate only once during the Windows application and can be accessed after all credentials stored securely .
In networks with multiple user accounts and credentials can be managed centrally by an administrator. Through the use of hardware tokens ( eg smart cards or USB - Sticks ) the individual employee is no longer in the own real credentials. Thanks to a special software process, the real keyboard and mouse input is locked, so the credentials can not be diverted to clear text fields and thus spied during single sign-on process.
The administrator can change the real access data independently without the token 's to learn again. Individual token 's can also be temporarily disabled or blocked as needed. Complete removal of the token 's from the database makes further use impossible.
Download abylon LOGON SSO Pro
Comments
Post a Comment