Results
No result found.
Multi-factor authentication
- Multi-factor authentication
Active Directory hybrid identity: Extend on-premise Active Directory identity to Entra ID
Organizations looking at a hybrid future face a clear choice: stick with the limitations of their existing on-prem AD or move identity to Microsoft’s cloud platform and Entra ID.
Read - Multi-factor authentication
How to use YubiKey on RDP sessions
If you already have YubiKeys, you probably bought them for a specific use case. Did you know you can also use YubiKey to secure Remote Desktop Protocol (RDP) connections? With UserLock, it’s easy.
Read - Multi-factor authentication
SharePoint MFA: Secure access to SharePoint on-premise and online
Simplify SharePoint MFA implementation with UserLock — a single MFA solution based on-premise that extends access security to SharePoint Online and SharePoint On-Premise.
Read - Multi-factor authentication
Simplify on-premise management for Microsoft 365 MFA
There are many reasons why organizations based on-premise look to manage a single on-premise MFA solution across Windows MFA and Microsoft 365 MFA. Here's how UserLock can help.
Read - Multi-factor authentication
Defending Active Directory: Containing the threat of privilege abuse and escalation
Attackers often try to elevate their account privileges to move laterally inside the network. Stop privilege abuse in Active Directory with UserLock.
Read - Multi-factor authentication
For VPN security, MFA is a must
Multi-factor authentication (MFA) prevents unauthorized access and enhances VPN security. Learn how to secure VPN sessions with UserLock.
Read - Multi-factor authentication
Prevent lateral movement with multi-factor authentication (MFA)
Prevent lateral movement in your network with zero trust access security measures including multi-factor authentication (MFA), access controls, and privileged access management.
Read - Multi-factor authentication
How much does MFA cost, really?
Here's how to estimate the true cost of multi-factor authentication (MFA), from licensing fees to productivity impacts.
Read - Multi-factor authentication
Comply with NIS2 Directive MFA requirements
UserLock supports NIS2 MFA requirements while simplifying implementation in on-premise-first Active Directory environments.
Read - Multi-factor authentication
Securing a demilitarized zone (DMZ) network with MFA
Learn more about authentication in a DMZ and why securing a DMZ with MFA is both an art and a science.
Read - Multi-factor authentication
MFA for servers: Windows Server Core MFA with UserLock
Windows Server Core offers a minimalist Windows server installation, but it needs the same protection as any other Windows server: strong passwords, access controls, and MFA for servers. UserLock offers a simple way to implement Server Core MFA.
Read - Multi-factor authentication
Boost VDI security in on-premise Active Directory: VDI MFA and access controls
Virtual desktop infrastructure (VDI), also called remote desktop virtualization, is a computing model organizations use to support a range of application use cases that traditional PC-based computing struggles to accommodate. Here’s how UserLock enables on-premise VDI security with VDI MFA and access controls.
Read - Multi-factor authentication
How UserLock solves the Outlook on the Web (OWA) MFA puzzle
Learn how UserLock solves the Outlook on the Web (formerly OWA) MFA puzzle for on-premise Active Directory environments.
Read - Multi-factor authentication
Secure RemoteApp with MFA and access controls
Learn about secure MFA for RemoteApp connections with UserLock.
Read - Multi-factor authentication
How authentication works in Active Directory
Active Directory authentication manages user identities and access within an organization's network. Learn how authentication works in Active Directory, and identify the challenges, and solutions, for organizations moving towards cloud adoption.
Read - Multi-factor authentication
Remote Desktop Gateway: MFA and access controls for RD Gateway and RD Web
Secure Remote Desktop Gateway (RD Gateway or RDG) with MFA and access controls. Protect vulnerable RDP connections, often through RD Web.
Read - Multi-factor authentication
Secure Remote Desktop Protocol (RDP) with UserLock RDP MFA and access controls
Remote Desktop Protocol (RDP) MFA is a must to mitigate risk. Learn how to secure RDP access with UserLock's RDP MFA and access controls.
Read - Multi-factor authentication
Secure air-gapped networks with MFA and access controls
An air-gapped network has no physical connection to the public internet or to any other local area networks or systems that are not themselves air gapped. Here’s how UserLock enables secure multi-factor authentication (MFA) and access controls on air-gapped networks.
Read - Multi-factor authentication
Multifactor authentication (MFA) for the Essential Eight Maturity Model
Learn about the role of multi-factor authentication (MFA) in Australia’s Essential Eight Maturity Model, and how UserLock can help your organization meet the MFA requirement.
Read - Multi-factor authentication
Offline MFA: How UserLock MFA works without internet
Many compliance and security requirements require proof of MFA across all circumstances, including when users are offline (not connected to the internet). Here's how UserLock's offline MFA works.
Read - Multi-factor authentication
Azure MFA Server vs. Azure AD MFA: What’s the difference?
Explore the differences between Azure AD (now Microsoft Entra ID) multi-factor authentication (MFA) and the MFA server, and learn how UserLock can enhance security.
Read - Multi-factor authentication
The new FTC MFA requirement: Here’s what auto dealers need to know
The FTC's multi-factor authentication (MFA) requirement impacts auto dealers. Here's what auto dealerships need to know.
Read - Multi-factor authentication
How does MFA prevent man-in-the-middle (MiTM) phishing attacks?
Man-in-the-middle (MiTM) phishing attacks on multi-factor authentication (MFA) exploit gaps in MFA implementation.
Read - Multi-factor authentication
Two-factor authentication in schools: The essential guide
Two-factor authentication (2FA) provides strong access security for educational institutions. Here’s how to ensure your organization is compliant and protected.
Read