Identity and Access Management

ROCK implement robust authentication procedures to prevent unauthorised access to clients’ various digital assets and improve employee productivity.

Scroll down

Secure authentication processes

Media portrayals of cyber criminals may suggest that they exclusively leverage advanced techniques in order to gain access to restricted digital areas and assets but, in reality, this simply isn’t the case. A 2018 study from Verizon revealed that 80% of successful breaches come about because a hacker has successfully obtained the necessary credentials. Credential stuffing and brute force attacks (where software is used to rapidly enter a variety of login details until access has been achieved) are behind 90% of all login attempts made online.

In short, it’s vital that organisations do all that they can to ensure their authorisation processes are as robust as possible.

Robust user verification

Coupling the latest in artificial intelligence with central management systems, ROCK’s authentication portals consider identifying characteristics – including IP addresses, MAC addresses etc. – to detect login attempts that are likely to be malicious. In the event that an attempt is deemed to have originated from an unauthorised entity, two-factor authentication is activated when the correct credentials are provided.

Both the characteristics that will be leveraged to authenticate login attempts and further validation requirements are determined through in-depth and rigorous consultations with each client.

Enhancing productivity with single sign-on

Ubiquitous adoption of cloud-based applications and infrastructures has left employees needing to remember several sets of credentials leading to inefficient processes and also costly downtime. With ROCK’s Smart Single Sign-On feature, users can login to all applications through one individual portal, resulting in a streamlined and simplified procedure.

Insights

Remote Working Productivity Thumbnail.jpg
Strategy

COVID-19: The tools we’re using to maintain productivity

02/04/2020

View more
why-sam-from-thumb.jpg
Cyber Security

Why Sam from accounting is more dangerous than LulzSec

27/02/2020

View more
deepfake banner.jpg
Cyber Security

Why deepfake is the future of smart cyber crime

29/01/2020

View more
the future of cyber crie.jpg
Cyber Security

Interview: the future of cyber crime & protection

17/01/2020

View more

What next?

I want to discuss with your experts:

Hello, welcome to the ROCK live chat.

Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×