Novalys’ Application Security product - Visual Guard was showcased in the Virtual Cybersecurity Tour by Business France North America.
Novalys’ Application Security product - Visual Guard was showcased in the Virtual Cybersecurity Tour by Business France North America.
Visual Guard offers a multi-factor authentication solution for your business with low cost, high security & agility features.
The Visual Guard team discussed business applications’ security solutions at the RSA Conference 2020.
Visual Guard 2019 brings compatibility with .Net Core to secure cross-platform (Windows, macOS, and Linux), Cloud and IoT applications.
It also includes a new module to simplify integration with Angular applications.
Stay tuned for more innovative features expected with Visual Guard 2019
By connecting to Visual Guard and accessing the Encryption settings you can enable the FIPS compliance mode .
Map Active Directory accounts attributes with Visual Guard users attributes to reuse or edit AD accounts and synchronize AD and VG user accounts.
Follow these guidelines to improve traceability, monitor sensitive activities in business applications.
This paper summarizes how GDPR applies to the context of business applications and explains how Visual Guard helps to make your applications GDPR compliant.
Not only VG2018 is expanding its feature set, it is also addressing GDPR requirements, by helping organizations making their business applications GDPR compliant.
VG 2018 can send email notifications when certain activities are detected. Alert administrators, controllers or managers when certain events occur.
Monitor sensitive activities in real-time: access to certain data, execution of certain business transactions, trigger of certain security events, etc.
Generate historical graphs to analyze business trends and detect possible issues.
Visualize the time when the user was or is connected to the application.
It may be complex to keep track of user permissions therefore, VG 2018 introduces new features to list permissions of a user or a group and find their origin.
Get a complete list of permissions, for a given user, group, role or permission set.
You may wonder where a particular permission is coming from. Via which permission set(s) and role(s) was it granted?
VG 2018 natively supports configurations with multiple Active Directory.
VG 2018 includes a new search window to query Active Directory and declare Windows accounts or Windows Groups in your VG Repository.
With VG 2018, role propagation is optional.
VG 2018 introduces an optional simplification: Permission sets are no longer mandatory. If needed, you can directly grant permissions to roles.
VG 2018 provides additional features that help managing large numbers of user groups.
Best practice for authentication and permissions. The objective of this document is to provide the reader with useful information about designing and creating a Role Based Access Control system (RBAC)
How to manage fined-grain permissions in your business applications
This document looks at identity management and access control (IAM) inside applications. It contains recommendations for those in charge of conceiving access control systems, organizing access rights and administering applicative security on the long term.
What you need to take into account to implement Single Sign-On across your applications.
As with any other application, you may want to secure these applications with user authentication, user permissions and auditing features. In such a case, multitenant applications need to meet several criteria: Protect Data from Other Tenants and Delegate administration privileges...
Why YOU need to abide by the Principle of Least Privilege.
Most people remember to secure against external threats, but what about the security of internal data in your applications?
How do you balance the access your users need with your company's resources?
How to simplify user management in your applications
Password fatigue is the phenomenon of feeling overwhelmed by the need to remember all of them. To combat this, many users have found coping strategies that undermine the security policies that the passwords were created to enforce.
Governments around the world are promoting and standardizing the digitization of patient information in the health care sector... Specifically, we will look at how the United States has implemented certain regulations that obligate health care actors to add new features to their applications within a certain time frame; this requires a solution that meets standards across the board and is easy to implement even in existing applications
I think any developer will agree with me that adding security features to an application can be an absolute pain. [...] with Visual Guard from Novalys, the integration of security features is no longer a slog...
"Multi-tenant" and "Software as a service" applications are becoming more and more common. Companies are looking for different ways to manage their IT needs. They expect solutions that can adapt to their internal organizational structure and lower their deployment and maintenance costs. Multi-tenant applications allow just that – low cost and flexible architecture. However, multi-tenant applications also pose unique challenges. In this article, we will look at security administration and user management in a multi-tenant application with Visual Guard.
Code Project runs an annual reader survey, asking them to rate their favorite tools, in categories such as Reporting, Debugging, and SQL Database tools. These results, decided by a community of developers more than seven million strong, are based on real trials and in-the-field experience.
Visual Guard is thrilled to be in the company of tools from companies like Red Gate, Intel, and SAP.
See for yourself why Visual Guard was chosen “Best Authentication Tool”
How to simplify user management in your applications
In a 2002 NTA Monitor survey, it was found that the typical intensive computer user had, on average, 21 passwords. ... Password fatigue is the phenomenon of feeling overwhelmed by the need to remember all of them. To combat this, many users have found coping strategies. For example, they often create a list of passwords in a file, or even put them on post-its stuck to their terminals. All of this undermines the security policies that the passwords were created to enforce.
"This isn't a popularity contest. A product that earns a VSM Readers' Choice Award has earned the respect and loyalty, over time, of VSM readers, some of the most demanding users on the planet" Michael Desmond, Visual Studio Magazine editor in chief.
Members were asked to rate their favorites on tools. The Code Project staff then compiled the highest rated listings, awarding the highest ranked in each product category. The results reflect actual perceptions of what developers value. Each codeproject.com member decides which companies or products deserve recognition, based on in-the-field experience.
See how to control access to .NET applications reusing Windows accounts for authentication. Integrate with Active Directory and grant roles and permissions to Windows accounts. Define permissions without adding code thanks to .NET reflection mechanism.
Application security is such
a problem that most developers prefer to ignore it. If ignoring
it is impossible then we often implement a custom solution with
user lists and passwords, or we simply expect the user control provided
by the operating system to do the job [...] Visual Guard for .NET
puts an end to this shoddy approach to security by making it trivial
to implement and by providing good administration tools, and it
works for both desktop applications and ASP.NET websites.
by Mike James
El reciente caso aparecido en la
televisión nacional, donde una factura recibida por un usuario
mostraba los apellidos de éste cambiados por palabras ofensivas,
ha puesto en evidencia una vez más la importancia de que las
aplicaciones a través de las cuales los empleados manipulan
los datos con que las empresas operan realicen una correcta autenticación
y registro de actividad de sus usuarios. Este mes presentamos Visual
Guard .NET, un cómodo y útil marco de trabajo que permite
gestionar de una manera eficiente y centralizada los usuarios, roles
y permisos de una aplicación y asegurar el acceso de los usuarios
a cada uno de los elementos de la misma...
by Octavio Hernández
Are you creating a security system for a SaaS application? Visual Guard is here to help! This article will list the important questions to ask during your project and the answers that Visual Guard provides to avoid security breaches or functional limitations that will hold you back