Network Access Control Solutions & Protection | Enterprise Password Management | Access Smart

Biometrics Are Less Secure Than Passwords

Biometrics give a false sense of security.

Biometrics authenticationOn Sept 23, 2015, Office of Personnel Management (OPM) revised the number of stolen fingerprint files to 5.6 million! Why should you care?

Some security pundits believe that biometrics are far more secure than passwords. They argue that since everyone has unique identifiers like their voice, iris, face and fingerprints, why not use these to authenticate a user in to a computer network? Sounds logical and from a theoretical perspective, it’s true. But major flaws become apparent during implementation. Read More→

Access Smart Secures Website

HTTPS Everywhere safeguards our visitors from malware.

https everywhereAccess Smart, LLC, a leading supplier of Cyber Access Control solutions, moves their website from the standard, unsecure Hypertext Transfer Protocol (HTTP) to the Hypertext Transfer Protocol Secure (HTTPS) web communications scheme as specified in the HTTPS Everywhere program. As internet browsers like for Google Chrome, Mozilla Firefox and Opera put more emphasis on security with their “HTTPS Everywhere” program, Access Smart wanted to embrace this forward thinking cybersecurity program.

“Access Smart is a cyber access control security company”, said Dovell Bonnett founder and CEO of Access Smart. “We believe that cybersecurity has to start before the firewall and continue throughout the entire Internet channel. It only makes sense that we would want to do everything possible to protect all our website visitors and customers.” Read More→

You Need Password Authentication Infrastructure

Password Authentication InfrastructureEvery day I read another post, hear another news story, or have another conversation that passwords are insecure and that PKI and digital certificates must replace passwords. Comparing passwords to certificates, or PKI, is not correct because:

  1. A passwords is a single component within multifactor authentication.
  2. Certificates and PKI are a complete infrastructure made up of many different components.
  3. What keeps certificates secure is how their keys are safeguarded, generated, protected, and managed

Read More→

Channel 9 Blogs about Power LogOn

Channel 9, a Microsoft community site for Microsoft customers, posts “Power LogOn Brings Additional Layer of Security to Azure.” “In today’s environment of increasingly sophisticated cyber-attacks, our mutual customers rely on proactive solutions such as Access Smart’s Power LogOn to help protect their computer systems,” said Nicole Herskowitz, Senior Director of Product Marketing for Microsoft Azure. “We are pleased that Access Smart will continue to make its security expertise available to help Azure customers improve the security of their data.”

Logon Security for Azure

Power LogOn® now supports Microsoft Azure

Access Smart® Improves Cybersecurity With Power LogOn.

Girl with Power LogOn in office button(190x190)LADERA RANCH, CA.  June 15, 2015 – Access Smart, LLC today announced that the Power LogOn software now supports Microsoft Azure.  Power LogOn adds an extra layer of cybersecurity during the initial logon process to Azure.  Azure provides Power LogOn customers with an efficient cloud solution, keeping data available with improved security.

Because cybersecurity needs to start before the firewall, Access Smart complements Azure by adding on a security-enhanced password manager.  To access the power of Azure, employees don’t need to type in their user name and password. The greatest security threat to any company is the employee managed user names and passwords. By removing this cybersecurity vulnerability, Power LogOn puts the control of sensitive data back in the hands of IT professionals. Read More→