SlideShare a Scribd company logo
1 of 8
Strengthening Authentication to Adapt to Changing Circumstances® Presented By Stephanie Urquhart Sales Assistant, PistolStar Inc.
What is PortalGuard? PortalGuard is an authentication and security solution that allows end-users to securely authenticate and manage their portal login credentials directly from a Web browser, while providing administrators with functionality to meet or exceed their security objectives. PortalGuard supports multiple platforms and portals including WebSphere/WebSphere Portal, SharePoint/IIS, and Lotus Domino.
Why Use PortalGuard? Does this describe your environment? Growing number of Web and enterprise applications raising the number of password stores and sets of password policies you need to manage.  Keeping up with the speed of business entails providing globally and remotely-based employees, customers, partners and vendors with streamlined access to corporate intranets and extranets.  PortalGuard is the solution for confronting your security challenges: Achieve Stronger Authentication Reduce Risk – Security and Financial Enhance Compliance with Security and Industry Standards Deliver Effective Password Policies
Many Configurable Password and Authentication Features… Self-service Active Directory Password Reset and Recovery– Highly configurable and secure challenge question and answer functionality Single password using Microsoft Active Directory – Have fewer passwords to remember and manage One-time password (OTP) – Offers a strong two-factor approach to authentication Verbal authentication to the help desk – By providing highly configurable challenge question and answer functionality Prevent multiple users from logging in with the same credentials  Define strike-out limits by person, group or hierarchy – Alerts are emailed when strike-out limits are exceeded  And many more…
A Technical Look At…One-time Password (OTP) Functionality
An Overview Of… Benefits for Multiple User Groups: For End-Users – Maintaining Productivity For Administrators – Avoiding Increased Help Desk Calls For Management – Stopping Hackers in Their Tracks Advantages for Numerous Industries: ,[object Object]
Government
Healthcare

More Related Content

What's hot

Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud ServiceForgeRock
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management SummaryQuest Software
 
Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?WSO2
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerSubhajit Bhuiya
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAndres Canello
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessJason Condo
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Azure multi factor authentication - Global Azure bootcamp 2018 security
Azure multi factor authentication - Global Azure bootcamp 2018  securityAzure multi factor authentication - Global Azure bootcamp 2018  security
Azure multi factor authentication - Global Azure bootcamp 2018 securityJoTechies
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
 
Security operations services
Security operations servicesSecurity operations services
Security operations servicesS&T GROUP
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 

What's hot (19)

Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
 
Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protections
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional Access
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Azure multi factor authentication - Global Azure bootcamp 2018 security
Azure multi factor authentication - Global Azure bootcamp 2018  securityAzure multi factor authentication - Global Azure bootcamp 2018  security
Azure multi factor authentication - Global Azure bootcamp 2018 security
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Security operations services
Security operations servicesSecurity operations services
Security operations services
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Mct summit 2021
Mct summit 2021Mct summit 2021
Mct summit 2021
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 

Viewers also liked

Association Enfants Du Bénin Debout
Association Enfants Du Bénin DeboutAssociation Enfants Du Bénin Debout
Association Enfants Du Bénin DeboutAssociation_EDBD
 
13250221 pss7
13250221 pss713250221 pss7
13250221 pss713250221
 
Voeux 2008 du president
Voeux 2008 du presidentVoeux 2008 du president
Voeux 2008 du presidentjmplanche
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometricssuniljoshi151
 
Temps Organisation Travail Public
Temps Organisation Travail PublicTemps Organisation Travail Public
Temps Organisation Travail PublicFrancois Bardel
 
Opérateurs privés de placement : quel bilan ? (2012)
Opérateurs privés de placement : quel bilan ? (2012) Opérateurs privés de placement : quel bilan ? (2012)
Opérateurs privés de placement : quel bilan ? (2012) France Travail
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
JPJ1409  Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudJPJ1409  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloudchennaijp
 
Paper id 28201413
Paper id 28201413Paper id 28201413
Paper id 28201413IJRAT
 
Appel Intersyndical De Calais Pour Le 1er Mai 1
Appel Intersyndical De Calais Pour Le 1er Mai 1Appel Intersyndical De Calais Pour Le 1er Mai 1
Appel Intersyndical De Calais Pour Le 1er Mai 1Francois Bardel
 
ضوء الحقيقه بالحقيقه قام - تلميذى عمواس
ضوء الحقيقه   بالحقيقه قام - تلميذى عمواسضوء الحقيقه   بالحقيقه قام - تلميذى عمواس
ضوء الحقيقه بالحقيقه قام - تلميذى عمواسIbrahimia Church Ftriends
 
App과 Server의 은밀한 대화
App과 Server의 은밀한 대화App과 Server의 은밀한 대화
App과 Server의 은밀한 대화Rock Kang
 
My Favorite Philosophy
My Favorite PhilosophyMy Favorite Philosophy
My Favorite PhilosophyYugoLady
 
Renaissance PKI / Séminaire Clusis 2003
Renaissance PKI / Séminaire Clusis 2003Renaissance PKI / Séminaire Clusis 2003
Renaissance PKI / Séminaire Clusis 2003Sylvain Maret
 
Ch2 hist les mutationsdes sociétés
Ch2 hist les mutationsdes sociétésCh2 hist les mutationsdes sociétés
Ch2 hist les mutationsdes sociétésjulienbardoux
 

Viewers also liked (20)

Association Enfants Du Bénin Debout
Association Enfants Du Bénin DeboutAssociation Enfants Du Bénin Debout
Association Enfants Du Bénin Debout
 
13250221 pss7
13250221 pss713250221 pss7
13250221 pss7
 
Voeux 2008 du president
Voeux 2008 du presidentVoeux 2008 du president
Voeux 2008 du president
 
1er Mai Tract Boulogne
1er Mai Tract Boulogne1er Mai Tract Boulogne
1er Mai Tract Boulogne
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Temps Organisation Travail Public
Temps Organisation Travail PublicTemps Organisation Travail Public
Temps Organisation Travail Public
 
قائمة المكرمين في عيد الشغل
قائمة المكرمين في عيد الشغلقائمة المكرمين في عيد الشغل
قائمة المكرمين في عيد الشغل
 
Opérateurs privés de placement : quel bilan ? (2012)
Opérateurs privés de placement : quel bilan ? (2012) Opérateurs privés de placement : quel bilan ? (2012)
Opérateurs privés de placement : quel bilan ? (2012)
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
JPJ1409  Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudJPJ1409  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Paper id 28201413
Paper id 28201413Paper id 28201413
Paper id 28201413
 
Hist prem th1 ch1
Hist prem th1 ch1Hist prem th1 ch1
Hist prem th1 ch1
 
Appel Intersyndical De Calais Pour Le 1er Mai 1
Appel Intersyndical De Calais Pour Le 1er Mai 1Appel Intersyndical De Calais Pour Le 1er Mai 1
Appel Intersyndical De Calais Pour Le 1er Mai 1
 
ضوء الحقيقه بالحقيقه قام - تلميذى عمواس
ضوء الحقيقه   بالحقيقه قام - تلميذى عمواسضوء الحقيقه   بالحقيقه قام - تلميذى عمواس
ضوء الحقيقه بالحقيقه قام - تلميذى عمواس
 
App과 Server의 은밀한 대화
App과 Server의 은밀한 대화App과 Server의 은밀한 대화
App과 Server의 은밀한 대화
 
Roissy anim
Roissy animRoissy anim
Roissy anim
 
Presentasi pgsd ump
Presentasi pgsd umpPresentasi pgsd ump
Presentasi pgsd ump
 
My Favorite Philosophy
My Favorite PhilosophyMy Favorite Philosophy
My Favorite Philosophy
 
Renaissance PKI / Séminaire Clusis 2003
Renaissance PKI / Séminaire Clusis 2003Renaissance PKI / Séminaire Clusis 2003
Renaissance PKI / Séminaire Clusis 2003
 
Ch2 hist les mutationsdes sociétés
Ch2 hist les mutationsdes sociétésCh2 hist les mutationsdes sociétés
Ch2 hist les mutationsdes sociétés
 

Similar to Pg presentation for steph

Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentationdanhsmith
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtmAgora Group
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnRiddhi Sood
 
Workflow and Row-Level Security Solutions for PeopleSoft
Workflow and Row-Level Security Solutions for PeopleSoftWorkflow and Row-Level Security Solutions for PeopleSoft
Workflow and Row-Level Security Solutions for PeopleSoftSmart ERP Solutions, Inc.
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Microsoft Norge AS
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Software Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsSoftware Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsInishTech
 
Software Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsSoftware Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsSoftwarePotential
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Servicesbeckyjacobs
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxkathyzink87
 

Similar to Pg presentation for steph (20)

Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
 
Workflow and Row-Level Security Solutions for PeopleSoft
Workflow and Row-Level Security Solutions for PeopleSoftWorkflow and Row-Level Security Solutions for PeopleSoft
Workflow and Row-Level Security Solutions for PeopleSoft
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
HIMANSHU BHARDWAJ
HIMANSHU BHARDWAJHIMANSHU BHARDWAJ
HIMANSHU BHARDWAJ
 
Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)Forefront Identity Manager 2010 (Av Rune Lystad)
Forefront Identity Manager 2010 (Av Rune Lystad)
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Hanu's Security Services
Hanu's Security ServicesHanu's Security Services
Hanu's Security Services
 
Software Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsSoftware Licensing for SaaS Applications
Software Licensing for SaaS Applications
 
Software Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsSoftware Licensing for SaaS Applications
Software Licensing for SaaS Applications
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Services
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Pg presentation for steph

  • 1. Strengthening Authentication to Adapt to Changing Circumstances® Presented By Stephanie Urquhart Sales Assistant, PistolStar Inc.
  • 2. What is PortalGuard? PortalGuard is an authentication and security solution that allows end-users to securely authenticate and manage their portal login credentials directly from a Web browser, while providing administrators with functionality to meet or exceed their security objectives. PortalGuard supports multiple platforms and portals including WebSphere/WebSphere Portal, SharePoint/IIS, and Lotus Domino.
  • 3. Why Use PortalGuard? Does this describe your environment? Growing number of Web and enterprise applications raising the number of password stores and sets of password policies you need to manage. Keeping up with the speed of business entails providing globally and remotely-based employees, customers, partners and vendors with streamlined access to corporate intranets and extranets. PortalGuard is the solution for confronting your security challenges: Achieve Stronger Authentication Reduce Risk – Security and Financial Enhance Compliance with Security and Industry Standards Deliver Effective Password Policies
  • 4. Many Configurable Password and Authentication Features… Self-service Active Directory Password Reset and Recovery– Highly configurable and secure challenge question and answer functionality Single password using Microsoft Active Directory – Have fewer passwords to remember and manage One-time password (OTP) – Offers a strong two-factor approach to authentication Verbal authentication to the help desk – By providing highly configurable challenge question and answer functionality Prevent multiple users from logging in with the same credentials Define strike-out limits by person, group or hierarchy – Alerts are emailed when strike-out limits are exceeded And many more…
  • 5. A Technical Look At…One-time Password (OTP) Functionality
  • 6.
  • 13.
  • 15. Come from a vendor who has been in the business of authentication over 10 years
  • 16. Available with unprecedented support directly from the developersTailored Authentication For an environment and/or situation, which requires specific authentication functionality, our team would make the necessary adaptations to meet or exceed security objectives, and provide you with a fully supported solution. Matrix for Authentication Technologies
  • 17.
  • 18. Authority in Tailored Authentication solutions
  • 19. Reactive to customer driven requirements
  • 20. Experience across numerous platforms and applications including SharePoint/IIS, WebSphere, and Domino. The PistolStar Advantage Tailored Authentication: we deliver a product that will fit precisely with your environment Excellent Customer Service: receive support directly from the developers Easy Deployments: let us take you by the hand