One of Scorpion Software’s mandates is to educate the SMB space in the use of identity assurance solutions, and to show the value of strong authentication. Some of these values include:
- Enabling Employee Mobility and Productivity
- Protecting Business Reputation
- Preventing Unauthorized Access to Information, Applications and Financial Assets
- Providing auditing and non-repudiation
- Meeting Compliance objectives
Some of our work in this area includes:
As companies extend access to their business online, they need enhanced password security, better identity management, and improved remote access control. Unlike traditional password management systems, strong authentication delivers the appropriate safeguards to increase remote access productivity while reducing online risk and the associated operating costs. In this paper, we will explore the total cost of ownership (TCO) associated with the use of password security to allow small and medium sized businesses to make an informed decision about the value of strong authentication systems such as AuthAnvil. We will show that the hidden costs of “free” password security actually outweigh the costs of implementing strong authentication, and offer far less protection.
As companies extend their online business processes to encompass the acceptance of credit card payments, they need to ensure that they meet compliance objectives being set forth by major credit card companies. The Payment Card Industry Data Security Standard (PCI DSS) was created as a guideline to help organizations that process card payments prevent credit card fraud, hacking and various other security issues. In this paper, we will explore the guidance of the PCI standard and demonstrate how AuthAnvil can help to reach compliance objectives.
Password security is one of the weakest forms of user authentication in the industry. Yet businesses continue to use passwords to protect their most important corporate data. In this whitepaper, we will demonstrate why this practice may be a large risk to your business, and show how two-factor authentication and identity assurance can help to protect your business against attacks to weak, shared or stolen passwords.