Pre-Boot Network Authentication

Being an IT administrator can be very challanging, with many responsibilities ranging from making sure every employee has the proper working tools required to do their jobs to keeping corporate data safe. Some of the simplest tasks faced by IT Admins, such as password resets, can be very time consuming. In fact, IT Pros can spend as much as 20 minutes on a single employee password reset process. Depending on the size of the organization, that can add up over the course of a year.

Many organizations are now recognizing the benefits of Pre-Boot Network Authentication (PBNA) to help solve common IT headaches such as expensive and time consuming policies on employee password resets. Traditionally seen as a solution to only help enhance data security in an organization, IT Admins are now seeing the additional benefits of PBNA that were not explored before. Although a unique soluiton that is not offered by many data security vendors today, IT Admins who have experienced this solution in action have reported huge benefits not only on enhacing the security of their data but also on IT cost savings.

PBNA is able to alleviate a lot of IT Admin’s tasks by shortening the time required to for example, reset passwords through the use of Active Directory (AD).  , A support issue that use to take an average of 20 minutes can now be solved in as little as 5 minutes, without the IT Admin even having to leave their own desk.  This is a huge cost savings for IT departments as the process is now simplified, freeing up IT Admin’s time to perform other imporatn tasks.  It also increaes employee productivity as they do not have to waste time waiting for their password to be rest, allowing them to return to their jobs faster.  Click here for the Ponemon Study which details how much time empoyees and organizations lose as a result of forgotten passwords.

Want to know what else PBNA can do for your organization?
Download our complimentary PBNA whitepaper and find out →

Previous Post
Connect with us!
Next Post
Trusted Computing Group Opal vs Enterprise SEDs

Related Posts

Here, there, everywhere

It’s a busy month for events as we’re a week away from U.S. Thanksgiving. This week we find our folks in a couple different places at once talking to financial services organizations in Arizona and to IT security focused organizations…
Read more

Maturity Model

As the environment and industry becomes increasingly data driven, data encryption and data security become top of mind among most IT administrators.   (more…)
Read more

An offer you can’t refuse

This post is going to be a lot of shameless self-promotion for WinMagic but it’s something we think is important as it’s tied directly to the recent launch of SecureDoc 6.1. (more…)

Yahoo! Security!

It’s always fun to come up with headlines around a brand that has an exclamation point as part of their name, but I digress. What this is really about is Yahoo!’s recent announcement that they’re going to start to encrypt…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu