WatchGuard Expands Identity Protection Capabilities

This new solution adds advanced password management capabilities and Dark Web monitoring to help protect corporate credentials

WatchGuard Technologies has recently unveiled AuthPoint Total Identity Security, a comprehensive bundle that combines the award-winning AuthPoint multi-factor authentication (MFA) with dark web credential monitoring capabilities and a corporate password manager.

The introduction of this new product, paired with the zero trust risk-based policies of WatchGuard’s Unified Seciurity Platform architecture, enables managed service providers (MSPs) to provide optimal modern cybersecurity delivery from WatchGuard Cloud. “Stolen or leaked credentials are a primary cause of data breaches, yet passwords remain the most prevalent method of user authentication for organisations,” said Carla Roncato, vice president of Identity at WatchGuard.

While multi-factor authentication has become a mandatory requirement for organisations, most still need to deal with weak and reused passwords, shared admin passwords, credential leaks on the dark web, and corporate applications with limited MFA support. “AuthPoint Total Identity Security provides advanced password management capabilities and dark web monitoring to help protect corporate credentials in addition to MFA and web single sign-on.” Ronacato added.

AuthPoint Total Identity Security provides users with an easy-to-manage tool to generate complex passwords that are auto-filled through browser extensions for Microsoft Edge, Google Chrome, Apple’s Safari, and Firefox protected by a vault password. By storing each application’s credentials in a password manager, the user needs only to create and remember one unique, complex vault password, which helps mitigate the risk of phishing.  

Key features include:

  • AuthPoint MFA Service – Delivered through WatchGuard Cloud, AuthPoint MFA makes it easy to configure and manage offline and online verification methods and access policies across endpoints, VPNs, and web applications, and set up single sign-on application portals across multiple customer deployments.
     
  • Dark Web Monitoring Service – AuthPoint’s on-demand Dark Web Monitoring service notifies customers when compromised credentials, from up to three monitored domains, are found in newly acquired credential breach databases. Alerts are sent to impacted administrators and end users so they can generate new passwords quickly and before an account takeover occurs.
     
  • Password Manager – Built with business use cases in mind, AuthPoint’s Corporate Password Manager enforces a higher standard for passwords and helps reduce the frequency of password reset requests.

    Passwords do not need to be remembered as they are stored securely in the vault and further protected by each individual user’s unique, complex vault password, ensuring only they can decrypt and access the credentials within.

    When users need to access their apps, they can retrieve their passwords using the AuthPoint mobile app for iOS and Android and/or the browser extension to auto-fill credentials for a smoother overall single sign-on experience. It provides:
     
  • Corporate Vault – Add credentials and generate strong passwords for commonly used workplace applications where SSO is not enabled. Additionally, administrators can securely share credentials for the common use of an application.
     
  • Private Vault – Add credentials and generate strong passwords for personal and social apps. If the employee leaves the organisation, these personal credentials can be exported and imported to another password manager.

The new AuthPoint Total Identity Security bundle combines two categories of identity security into one with password management and multi-factor authentication and goes further by enabling credential monitoring to protect our customers from widespread credential-based risks.


For more information about AuthPoint Total Identity Security, click here.


You Might Also Read: 

Securing Hybrid Identity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Chinese Spies Used Forged Validation Tokens To Access Government Emails
Managing The Effects Of AI-Driven Cyber Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.