icon

Hideez-Blog | Neuigkeiten, Best Practices und Tipps zum Identitätsmanagement

Was ist IDaaS? Ultimativer Leitfaden zu Identity as a Service

<b>What Is IDaaS? Ultimate Guide to Identity as a Service</b>
Was ist IDaaS? Ultimativer Leitfaden zu Identity as a Service 7 Min. Lesen | 27. Juni 2024 Teilen: Mit der zunehmenden Anzahl von ...

Was ist FIDO2 und wie funktioniert es? Vorteile und Nachteile der passwortlosen Authentifizierung

<b>What Is FIDO2 and How Does It Work? Passwordless Authentication Advantages & Disadvantages</b>

Sich bei einer Website oder einem Dienst mit der herkömmlichen Kombination aus Benutzername und Passwort anzumelden, ist nicht mehr die beste oder sicherste Methode. Da Cyberkriminelle technologisch immer fortschrittlicher werden, müssen auch die Datenschutzmethoden weiterentwickelt werden. Hier können neue Authentifizierungsstandards wie FIDO2 zu einem nützlichen Instrument im Kampf gegen das Problem werden.

So stellen Sie ein vergessenes Passwort auf Facebook wieder her

<b>How to Recover a Forgotten Password on Facebook </b>
On its own, forgetting your Facebook password is frustrating. But when you realize that you might also require your Facebook account to log into other services, it becomes much more terrifying. But have no fear, there are a few ways to reset a forgotten password, and to we'll help you so you could never be concerned about having your Facebook password forgotten ever again. Some of the techniques, though, will only work if you prepared beforehand.

HIPAA-konforme Videokonferenzplattformen: Vergleich von Google Meet, Teams und Skype

HIPAA Compliant Video Conferencing Platforms

The Health Insurance Portability and Accountability Act, more commonly known by its abbreviation HIPAA, is a crucial piece of legislation that provides a federal floor and sets a high standard for patient data confidentiality. HIPAA’s role is especially relevant with the increasing intertwinement of digital platforms and healthcare practices

Was ist Proximity Login? Vollständiger Leitfaden zur Proximity-Authentifizierung und MFA

Proximity login & logout

Even in 2024, we still primarily rely on traditional methods of authentication based on a username/password combination. However, not only is this method impractical the more passwords you need to remember, but there are also many more efficient and more secure methods of cyber authentication. One of the increasingly more popular forms of authentication is Proximity-Based Authentication. 

Sicherheitslösungen für die Fertigung: Top-Tipps zur sicheren Fertigung und Zugangskontrolle

<b>Manufacturing Security Solutions:  Top Tips on Secure Manufacturing & Access Control</b>

Due to the inherent way they operate, manufacturing sites are faced with a unique set of challenges that many other organizations don’t have to deal with. This puts manufacturers in a burdensome position of having to implement robust integrated security solutions to ensure around-the-clock protection. In this article, we’ll discuss the best manufacturing security solutions and OT security solutions, and share the top tips for establishing secure manufacturing.

Was ist Unternehmenssicherheit? Top-Tipps und Lösungen für 2024

<b> What Is Corporate Security? Top Tips and Solutions for 2024 </b>

Although absolutely critical for all organizations, corporate security is, unfortunately, often misunderstood. Although the perception around it is slowly but surely changing, many businesses still see it as a redundant expense. So, what is corporate security management exactly? How does it work, how can you enhance it, and what are the main challenges that stand in the way?

Wie melde ich mich ohne Kennwort bei Windows 10 an und vermeide Sicherheitsrisiken?

How to Log into Windows 10 without Password and Avoid Security Risks?

Bei jeder Anmeldung bei Ihrem Windows-Computer ein Passwort eingeben zu müssen, kann lästig sein, insbesondere wenn Sie eine schwierige und komplexe Kombination verwenden. Glücklicherweise gibt es einige Möglichkeiten, Ihr Windows 10-Passwort zu entfernen, ohne Ihre vertraulichen Informationen zu gefährden. Lesen Sie weiter und erfahren Sie, wie Sie die Anmeldung bei Windows 10 ohne Passwort aktivieren und dabei Sicherheitsrisiken vermeiden.

Erhöhte Sicherheit: Hideez und Ekran System bündeln ihre Kräfte für fortschrittliches Endpoint Identity Management

<b>Elevating Security: Hideez and Ekran System Join Forces for Advanced Endpoint Identity Management</b>
Hideez is delighted to announce a strategic partnership with Ekran System, a leading provider of insider risk management solutions. This collaboration marks a significant step forward in enhancing our clients' security posture by integrating Hideez's state-of-the-art authentication technologies with Ekran System's comprehensive insider threat management platform.

Hideez ist jetzt ein Microsoft-kompatibler FIDO-Sicherheitsschlüsselanbieter

Microsoft-approved FIDO2 security key vendor
We are thrilled to announce that Hideez Group Inc. has achieved the status of a Microsoft-approved FIDO2 security key provider, renowned for delivering a passwordless experience through the Hideez Key 4. This advanced key supports Bluetooth, NFC, and USB authentication and seamlessly integrates with all FIDO services.

Der Hideez-Authentifizierungsservice ist jetzt auf dem AWS Marketplace verfügbar!

<b>Hideez Authentication Service is Now Available on AWS Marketplace!</b>
We are delighted to announce the availability of Hideez Authentication Service as a Security solution in the AWS Marketplace! AWS Marketplace serves as a digital hub hosting thousands of software listings by independent vendors, simplifying the process of finding, evaluating, procuring, and deploying software compatible with Amazon Web Services (AWS).

Bewältigung der Authentifizierungsherausforderungen in medizinischen Einrichtungen mit innovativen Lösungen für das Gesundheitswesen

<b>Addressing Authentication Challenges in Medical Facilities With Innovative Healthcare Solutions</b>

In today's era of healthcare transformation, safeguarding patient data with utmost security and privacy has become an absolute imperative. At the heart of this quest lies the challenge of authentication – the process of verifying user identities to access sensitive information. This article investigates these authentication challenges and demonstrates the potential of passwordless authentication as an integrated healthcare solution.