This week, the CloudEntr Team is excited to announce that we have listened to our customers when it comes to data risk in the cloud, taking on the other piece of the cloud security puzzle: file sharing and collaboration.
CloudEntr now offers an all-in-one solution for secure application access and file sharing in the cloud.
The cloud has provided high-powered, convenient, mobile, and low-cost tools that businesses can’t pass up. So, how do you control and secure all of your business data without losing the convenience of the cloud?
I am proud to announce our July Release today, transforming CloudEntr into that one place companies secure their applications and files in the cloud.
If you’re using cloud-based applications in your business (and that covers most businesses), there are good reasons to care – deeply – about SAML. But really, what the heck is SAML and why should you and your business care?
AVISIAN Publishing reviews CloudEntr's password manager and identity and access management features in the Summer 2014 edition of their identity technology publication Regarding ID. Naming CloudEntr the solution that brings "...big business identity management to the small enterprise".
Security pros know that a user name and password pair isn’t the most secure method of logging into your businesses sites and apps – just wait a news cycle and you’re sure to hear about another breach where a company’s passwords have been exposed. But for the time being passwords are still the defacto way that businesses access cloud and web resources daily.
Check out what universities Stanford and Emerson College are doing to get their employees and students on the straight and arrow of secure password policies... and they're going willingly.
Businesses want assurance that their data and resources are safe, and it’s no secret that passwords are not cutting it anymore. Let’s be honest, they are the weakest link in the security chain. And why is that? Well, it’s mostly attributed to the “something you know” piece of the authentication equation AKA the human element. So how do you solve this problem? Implement that second gate of security, two-factor authentication.
CloudEntr's May feature release delivers more options and more convenience for businesses and employees to use two-factor authentication.
It's no secret that cloud-based applications have revolutionized the way we work, but according to new our survey report with The 451 Group, they’re also changing how enterprises use Identity and Access Management (IAM) solutions and are creating a realized need for SMBs to invest in cloud security.
Learn why IAM solutions are a top priority for companies in 2014: we share key industry trends, IT planning priorities, criteria for selecting the right solution, and security tips direct from over 200 business management, IT, and security professional from our 2014 report, The Growing Cloud Identity Crisis.
Today, the team and I are thrilled to build upon our February new UI release with new features to increase customer productivity and provide a seamless web experience when it comes to securing access to their cloud apps on the web.
The dust is settling on what has been an explosive week in digital security. Just 96 hours ago, Codenomican and researchers at Google announced they had uncovered a major security threat affecting more than 66% of the web. Making the Heartbleed Bug, one of the largest security threats the World Wide Web has ever seen.
So what does this means for your business and what are the actions you can take to secure it?
You’ve most likely heard by now the buzz surrounding Monday’s announcement by security firm Codenomican and Google researcher Neal Mehta – the Heartbleed Bug has been unearthed. CloudEntr customers can rest assured their accounts and credentials are safe.
And here's why.
Your company’s employees are full of good intentions when it comes to network security — they really are. But they’re also busy and distracted, and they have a nasty habit of choosing passwords like “123456” out of expedience. So you have to save them from themselves.
To do that, you need to implement a technology safety net that simplifies their worklife and follows them anywhere...
We are proud to announce our support of MSPAlliance's We Support the Standard initiative by offering an incentive program centered around the CloudEntr secure cloud access solution to United Certification Standard (UCS) certified cloud and managed service providers.
Interested? Read MSPAlliance's announcement released at their annual MSPWorld event in Orlando, FL for more details on the program and how to enroll.
SMBs are fortunate to avoid many of the hassles and bureaucracy that are inevitable for big enterprises. But they often lack the budget and personnel that their larger brethren can throw at business issues — especially IT.
These days, cloud-based technologies are leveling the IT playing field, lowering costs while ensuring rapid deployment and high performance. This means that SMBs can now benefit from enterprise-grade technology for the issues that matter most, password management definitely being one of them...
IT managers, do you ever feel like you’re the Big Bad Wolf? When you try to rein in your users, even just to enforce good password policies, they sometimes act like you’re trying to blow their house down. When in fact you’re the one trying to convince them to move into a house made out of bricks.
You don’t have to be the bad guy...
And why should you care?
You should care about two factor authentication because it keeps you much safer as you use online applications to do your work. If you’re in IT, you should be thrilled about it, because it can keep all of your users safer -- without creating any inconvenience for them.
Today, the team and I are thrilled to unveil our sophomore release, focusing on usability and productivity for our customers with a redesigned one-click, lightning fast user interface (UI).
Social login can be a powerful tool – it’s really easy for the user to set up an account to authenticate them across web apps. They don’t have to manage any new accounts or passwords. And the app they're logging into gets a new customer, quickly and easily. You might like it as a consumer – but should you enable social login for your employees?
Spoiler alert: I’m talking about this topic at the upcoming RSA Conference in San Francisco, CA February 24th.
With the ongoing ‘consumerization’ of business technology, it’s no longer practical or even possible for IT to strictly control what everyone does. How does IT redefine its role while still meeting core business objectives?
In follow up to our previous blog on the 'mythical business user', let’s switch hats and take a look at the trend and its implications from the role of IT.
Did you read the news last week? Cybersecurity firm Trustwave reported a massive breach of two million passwords for sites including Google, Facebook, Twitter, Yahoo and others.
Ouch. That’s painful – not only for those two million people, but potentially for your business as well. Whats it mean for your business?
How Secure is My Password? The biggest cloud security threat just be six little characters – “123456.”