Staying Current on Security
Akore Trust sets the standard for cloud based security and will be an effective partner for any enterprise.
A Fully Managed Solution Has Benefits
Offers Security & Compliance Readiness!
Continuous Threat Detection
Full visibility info who is accessing data with continuous auditing at the I/O storage level.
Reduced attack space and increased availability
Data minimization through encryption policies reduces opportunity for attacks and disruption.
Added data security with minimum impact to operations
Transparent to users, operating systems and applications.
Reduced time to compliance by up to 50%
Encryption with centralized key management delivers an efficient solution for meeting data security regulations.
TLS 1.1 or Higher
Beginning July 22, 2017, Akore will require secure Org connections to use the latest protocol TLS 1.1 or higher to provide a more secure environment and continued PCI compliance. Orgs using TLS 1.0 must be upgraded for continued access to API integration, connections to communities and sites, partner app exchanges, and user browser access.
Login IP Ranges
Login IP Ranges limit unauthorized access by requiring users to login to Akore from designated IP addresses — typically your corporate network or VPN. By using Login IP Ranges, admins can define a range of permitted IP addresses to control access to Akore. Those who try to login to Akore from outside the designated IP addresses will not be granted access.
Decrease Session Timeout Thresholds
Users sometimes leave their computers unattended or they don’t log off. You can protect your applications against unauthorized access by automatically closing sessions when there is no session activity for a period of time. The default timeout is 2 hours; you can set this value from between 30 minutes and 8 hours.
Educate Users About Phishing
Akore highly recommends phishing education for all Akore users. Most cyber attacks use malware (malicious software) to infect a computer with malicious code designed to steal passwords, data, or disrupt an entire computer/network. Fortunately, you don’t need to be a security expert to help stop malware.
Phishing scams use fraudulent emails to get users to reveal confidential information. Such emails typically look as though they come from a legitimate organization and may contain links to what appears to be that organization’s site, but is actually a fake site designed to capture information.
Report suspicious emails by forwarding them to email@example.com
As these scams get more sophisticated, it can be tough knowing whether an email is real or fake. The best way to avoid being tricked is knowing what to look for. Check out these examples of recent scams: