WatchGuard Expands Identity Protection Capabilities

This new solution adds advanced password management capabilities and Dark Web monitoring to help protect corporate credentials

WatchGuard Technologies has recently unveiled AuthPoint Total Identity Security, a comprehensive bundle that combines the award-winning AuthPoint multi-factor authentication (MFA) with dark web credential monitoring capabilities and a corporate password manager.

The introduction of this new product, paired with the zero trust risk-based policies of WatchGuard’s Unified Seciurity Platform architecture, enables managed service providers (MSPs) to provide optimal modern cybersecurity delivery from WatchGuard Cloud. “Stolen or leaked credentials are a primary cause of data breaches, yet passwords remain the most prevalent method of user authentication for organisations,” said Carla Roncato, vice president of Identity at WatchGuard.

While multi-factor authentication has become a mandatory requirement for organisations, most still need to deal with weak and reused passwords, shared admin passwords, credential leaks on the dark web, and corporate applications with limited MFA support. “AuthPoint Total Identity Security provides advanced password management capabilities and dark web monitoring to help protect corporate credentials in addition to MFA and web single sign-on.” Ronacato added.

AuthPoint Total Identity Security provides users with an easy-to-manage tool to generate complex passwords that are auto-filled through browser extensions for Microsoft Edge, Google Chrome, Apple’s Safari, and Firefox protected by a vault password. By storing each application’s credentials in a password manager, the user needs only to create and remember one unique, complex vault password, which helps mitigate the risk of phishing.  

Key features include:

  • AuthPoint MFA Service – Delivered through WatchGuard Cloud, AuthPoint MFA makes it easy to configure and manage offline and online verification methods and access policies across endpoints, VPNs, and web applications, and set up single sign-on application portals across multiple customer deployments.
     
  • Dark Web Monitoring Service – AuthPoint’s on-demand Dark Web Monitoring service notifies customers when compromised credentials, from up to three monitored domains, are found in newly acquired credential breach databases. Alerts are sent to impacted administrators and end users so they can generate new passwords quickly and before an account takeover occurs.
     
  • Password Manager – Built with business use cases in mind, AuthPoint’s Corporate Password Manager enforces a higher standard for passwords and helps reduce the frequency of password reset requests.

    Passwords do not need to be remembered as they are stored securely in the vault and further protected by each individual user’s unique, complex vault password, ensuring only they can decrypt and access the credentials within.

    When users need to access their apps, they can retrieve their passwords using the AuthPoint mobile app for iOS and Android and/or the browser extension to auto-fill credentials for a smoother overall single sign-on experience. It provides:
     
  • Corporate Vault – Add credentials and generate strong passwords for commonly used workplace applications where SSO is not enabled. Additionally, administrators can securely share credentials for the common use of an application.
     
  • Private Vault – Add credentials and generate strong passwords for personal and social apps. If the employee leaves the organisation, these personal credentials can be exported and imported to another password manager.

The new AuthPoint Total Identity Security bundle combines two categories of identity security into one with password management and multi-factor authentication and goes further by enabling credential monitoring to protect our customers from widespread credential-based risks.


For more information about AuthPoint Total Identity Security, click here.


You Might Also Read: 

Securing Hybrid Identity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Chinese Spies Used Forged Validation Tokens To Access Government Emails
Managing The Effects Of AI-Driven Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.