Common Misconceptions About Multi-Factor Authentication
Published on February 5, 2014
Although multi-factor authentication has been repeatedly proven to be a more secure way to protect user accounts from hackers, many common misconceptions still prevail about what counts as strong multi-factor authentication. Some account security measures that by themselves are weak multi-factor authentication, at best, include:…
Latest Enhancements Position MegaCryption as Best-In-Class Encryption Software for Big Data
Published on February 5, 2014
Naples, FL—January 2014 Advanced Software Products Group’s (ASPG) latest announced enhancements to MegaCryption simultaneously offer increased protection and increased ease of use to creators and consumers of Big Data. The enhancements include increased centralization of cryptographic key portability and interoperability, as well as increased support…
ReACT Self-Service Password Reset Software Extends User Reach
Published on January 30, 2014
Naples, FL—January 2014 Advanced Software Products Group (ASPG) has announced changes to ReACT, its enterprise-grade self-service password reset software, that further extend the reach and usability of the system for both end users and administrators alike. The changes enhance ReACT accessibility across all operating systems…
Physical Security for Mainframes
Published on January 29, 2014
On this blog, we've discussed many of the important elements of data security, including encryption, access controls, multi-factor authentication, password management, and many others. However, no data security strategy is complete without physical control over the hardware. A comprehensive data security system requires physical control…
ReACT Password Reset Software for Enterprise Now Offers Highest Possible Security
Published on January 28, 2014
Naples, FL—January 2014 Advanced Software Products Group (ASPG) has announced changes to ReACT, its enterprise-grade self-service password reset software, that now provide the highest possible levels of password reset security through its use of multi-factor authentication (“MFA”). ReACT, a self-service password reset and synchronization software…
Are You Making One of These Database Encryption Mistakes?
Published on January 22, 2014
Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…
2013 Was a Year of Big Data Breaches
Published on January 20, 2014
There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many "Top Ten Worst Data Breaches of 2013" lists. Some breaches come…
The Future of the Mainframe
Published on January 2, 2014
For the past two decades, the mainframe has been on a constant deathwatch with IT "experts" and analysts regularly predicting its downfall and extinction. However, the mainframe, both as a style of hardware and as a computing platform, has survived, thrived, and evolved to overcome…
Mainframe Access Management
Published on December 23, 2013
One of the most compelling features of the mainframe is how it allows so many processes to run simultaneously. The mainframe's design allows it to have many users performing a variety of actions day after day without rest. Because mainframes are able to do so…
Protecting Mission Critical Systems Through Data Encryption
Published on December 20, 2013
Of all the data security tools and techniques available, data encryption remains the most effective way to keep mission critical data secure and out of the wrong hands. Many large organizations today rely on mission critical technology. Mission critical can refer to any part of…