All Cloud Security for Business, All the Time...

Gemalto Bundles Secure File Sharing and Access Management to Offer All-in-One Identity Cloud Solution
Posted by Macey Morrison on July 30, 2014

This week, the CloudEntr Team is excited to announce that we have listened to our customers when it comes to data risk in the cloud, taking on the other piece of the cloud security puzzle: file sharing and collaboration.

CloudEntr now offers an all-in-one solution for secure application access and file sharing in the cloud. 

And Then There was One: Secure File Sharing & Access in the Cloud from CloudEntr
Posted by Ella Segura on July 28, 2014

The cloud has provided high-powered, convenient, mobile, and low-cost tools that businesses can’t pass up. So, how do you control and secure all of your business data without losing the convenience of the cloud?

I am proud to announce our July Release today, transforming CloudEntr into that one place companies secure their applications and files in the cloud.

What can J-Lo Teach us About SAML, and Why Should your Business Care?
Posted by Christopher Bartik on July 27, 2014

If you’re using cloud-based applications in your business (and that covers most businesses), there are good reasons to care – deeply – about SAML. But really, what the heck is SAML and why should you and your business care? 

CloudEntr Brings Big Business Identity and Access Management to the Small Enterprise: A Review
Posted by Macey Morrison on July 22, 2014

AVISIAN Publishing reviews CloudEntr's password manager and identity and access management features in the Summer 2014 edition of their identity technology publication Regarding ID. Naming CloudEntr the solution that brings "...big business identity management to the small enterprise".

An Enlightened Approach to Password Security: Getting Beyond 8 Characters
Posted by Macey Morrison on July 09, 2014

Security pros know that a user name and password pair isn’t the most secure method of logging into your businesses sites and apps – just wait a news cycle and you’re sure to hear about another breach where a company’s passwords have been exposed. But for the time being passwords are still the defacto way that businesses access cloud and web resources daily. 

Check out what universities Stanford and Emerson College are doing to get their employees and students on the straight and arrow of secure password policies... and they're going willingly.

New Feature Release: More from Two-factor Authentication
Posted by Ella Segura on May 23, 2014

Businesses want assurance that their data and resources are safe, and it’s no secret that passwords are not cutting it anymore. Let’s be honest, they are the weakest link in the security chain. And why is that? Well, it’s mostly attributed to the “something you know” piece of the authentication equation AKA the human element. So how do you solve this problem? Implement that second gate of security, two-factor authentication. 
CloudEntr's May feature release delivers more options and more convenience for businesses and employees to use two-factor authentication.

SaaS Apps Accelerating an Identity & Access Management Evolution to the Cloud [Report]
Posted by Macey Morrison on May 05, 2014

It's no secret that cloud-based applications have revolutionized the way we work, but according to new our survey report with The 451 Group, they’re also changing how enterprises use Identity and Access Management (IAM) solutions and are creating a realized need for SMBs to invest in cloud security.

Learn why IAM solutions are a top priority for companies in 2014: we share key industry trends, IT planning priorities, criteria for selecting the right solution, and security tips direct from over 200 business management, IT, and security professional from our 2014 report, The Growing Cloud Identity Crisis.


New Feature Release: One-Click Usability
Posted by Ella Segura on April 21, 2014

Today, the team and I are thrilled to build upon our February new UI release with new features to increase customer productivity and provide a seamless web experience when it comes to securing access to their cloud apps on the web. 

96 Hours Later, What Does Heartbleed Mean for Your Business?
Posted by Macey Morrison on April 11, 2014

The dust is settling on what has been an explosive week in digital security. Just 96 hours ago, Codenomican and researchers at Google announced they had uncovered a major security threat affecting more than 66% of the web. Making the Heartbleed Bug, one of the largest security threats the World Wide Web has ever seen.

So what does this means for your business and what are the actions you can take to secure it?

CloudEntr Accounts Secure in Light of Heartbleed Bug
Posted by Macey Morrison on April 09, 2014

You’ve most likely heard by now the buzz surrounding Monday’s announcement by security firm Codenomican and Google researcher Neal Mehta – the Heartbleed Bug has been unearthed. CloudEntr customers can rest assured their accounts and credentials are safe. 

And here's why.

Save Your Employees from Themselves with an Online Password Manager
Posted by Macey Morrison on March 27, 2014

Your company’s employees are full of good intentions when it comes to network security — they really are. But they’re also busy and distracted, and they have a nasty habit of choosing passwords like “123456” out of expedience. So you have to save them from themselves.

To do that, you need to implement a technology safety net that simplifies their worklife and follows them anywhere...

MSPAlliance Launches Incentive Program for Certified MSPs Using Gemalto’s Secure Cloud Access Solution
Posted by Macey Morrison on March 27, 2014

We are proud to announce our support of MSPAlliance's We Support the Standard initiative by offering an incentive program centered around the CloudEntr secure cloud access solution to United Certification Standard (UCS) certified cloud and managed service providers. 

Interested? Read MSPAlliance's announcement released at their annual MSPWorld event in Orlando, FL for more details on the program and how to enroll.

Why Even Small Businesses Need Enterprise Password Management
Posted by Macey Morrison on March 20, 2014

SMBs are fortunate to avoid many of the hassles and bureaucracy that are inevitable for big enterprises. But they often lack the budget and personnel that their larger brethren can throw at business issues — especially IT.

These days, cloud-based technologies are leveling the IT playing field, lowering costs while ensuring rapid deployment and high performance. This means that SMBs can now benefit from enterprise-grade technology for the issues that matter most, password management definitely being one of them...

Who's Afraid of Identity Access Management?
Posted by Macey Morrison on March 13, 2014

IT managers, do you ever feel like you’re the Big Bad Wolf? When you try to rein in your users, even just to enforce good password policies, they sometimes act like you’re trying to blow their house down. When in fact you’re the one trying to convince them to move into a house made out of bricks.

You don’t have to be the bad guy... 

What is Two Factor Authentication?
Posted by Macey Morrison on March 06, 2014

And why should you care?

You should care about two factor authentication because it keeps you much safer as you use online applications to do your work. If you’re in IT, you should be thrilled about it, because it can keep all of your users safer -- without creating any inconvenience for them.

New Feature Release: Unveiling CloudEntr's One-Click, Lightning Fast UI
Posted by Ella Segura on February 24, 2014

Today, the team and I are thrilled to unveil our sophomore release, focusing on usability and productivity for our customers with a redesigned one-click, lightning fast user interface (UI).

Visit us at RSA Conference to find out: Should you "friend" social login for your business?
Posted by Tom R. Smith on February 18, 2014

Social login can be a powerful tool – it’s really easy for the user to set up an account to authenticate them across web apps. They don’t have to manage any new accounts or passwords. And the app they're logging into gets a new customer, quickly and easily. You might like it as a consumer – but should you enable social login for your employees?  

Spoiler alert: I’m talking about this topic at the upcoming RSA Conference in San Francisco, CA February 24th. 

IT adopts a new role: Curator
Posted by Christopher Bartik on January 06, 2014

With the ongoing ‘consumerization’ of business technology, it’s no longer practical or even possible for IT to strictly control what everyone does.  How does IT redefine its role while still meeting core business objectives?  

In follow up to our previous blog on the 'mythical business user', let’s switch hats and take a look at the trend and its implications from the role of IT.

Two million more reasons for SSO and 2 factor authentication
Posted by Macey Morrison on December 26, 2013

Did you read the news last week?  Cybersecurity firm Trustwave reported a massive breach of two million passwords for sites including Google, Facebook, Twitter, Yahoo and others. 

Ouch. That’s painful – not only for those two million people, but potentially for your business as well. Whats it mean for your business?

How secure is my password when I use 123456?
Posted by Christopher Bartik on December 19, 2013

How Secure is My Password? The biggest cloud security threat just be six little characters – “123456.”