Authentication & SSO

Useful and interesting info about our company and products.

  I recently came across reruns of a TV show from the 60’s called “Get Smart”. In the opening sequence of the show, the lead character, Maxwell Smart, played by Don Adams, must pass through nearly a dozen doors, or layers of security in order to access his job at “Control” where the secrets are…

Continue Reading

February 16, 2017 • Authentication & SSO

Originally published in The Connection September – October 2016 pg. 19   Andrew Price > VP Technology > XYPRO Technology Wendy Bartlett > Distinguished Technologist > HPE   XYGATE User Authentication (XUA) supports PCI DSS Multi Factor Authentication (MFA) requirement.   The Payments Card Industry Data Security Standard (PCI DSS) version 3.2 has recently been published.  The…

Continue Reading

  Exceeding your NonStop security, compliance and encryption needs for over 30 years.   At XYPRO we believe in exceeding your security needs. We not only provide our customers with the tools and solutions needed for enterprise security, we make it a goal to inform and educate using blogs and technical articles that speak to…

Continue Reading

Another NonStop Technical Bootcamp is behind us, and it’s time to reflect on what was an energetic, and very positive event.  For the first time since the old ITUG days we were back in Downtown San Jose, and it really felt like we were coming home.  After outgrowing two previous venues in the last two…

Continue Reading

You regularly upgrade your software to the latest release, right?  (wink)   Around the same time every year, we at XYPRO notice an increase in upgrade-related questions coming into our technical support group.  The good news about that is it’s an indication that our clients have a plan to upgrade.  Planning by setting aside time is…

Continue Reading

In today’s world of mobility, cloud computing, virtual workforces, social networks, and online businesses, stronger authentication for identity and access management is more critical than ever. Security vulnerabilities are skyrocketing and malicious attacks are being unleashed in unprecedented numbers with increasing sophistication, resulting in massive information and economic losses.

Identity and Access Management has historically focused on the attributes of a person’s identity. User ID and passwords are still often the only form of authentication used by organizations. Traditional forms of multi-factor authentication are not designed to address the explosive growth in internet-connected devices and online activity and are unable to meet the needs of scalability, ease of use, affordability, and mass-deployment that the online-connected world requires.