Telivy
Telivy
Telivy
Telivy
Telivy
Telivy
Telivy
Telivy

Identity And Access Management

Use Telivy to Create and Manage Passwords

Password Management

In today's hyper-connected world, passwords are the keys to our digital kingdom. Yet, just like a rusty lock weakens a fortress, weak passwords expose our personal and professional lives to an ever-evolving landscape of cyber threats. That's where password analysis becomes our digital sentinel, standing guard against malicious actors and ensuring our data remains secure.

Password Capture

The Telivy platform captures passwords from users to analyse them for weaknesses (next section). When deploying the Telivy executable, a password analysis capture tool is deployed to securely analyse the passwords stored in the user's chromium based browsers. Because of how chromium encrypts passwords, a user has to be logged to capture the passwords or the capture will be triggered once the user(s) log in.

To reduce any liability for you, we perform password analysis on the device and the clear text passwords are never stored in our servers. Telivy however stores the hash of the password. Hashes cannot be reverse engineered to generate the password.

If the executable is deployed as an admin, the executable will schedule password capture for most of the users that are present on the asset. The list of users is determined by the folder structure, Microsoft Azure AD user setup, local and global users configured on the system and a few different heuristics. In some cases, not all users are covered for password analysis. The assets table should show you the list of users the password analysis is scheduled for.

Image alt text
Image alt text

If the executable is deployed as a non admin, the executable will schedule password capture for only the current user that has executed the binary.

Why Analyze Passwords? It's More Than Just "123456"

Think of password analysis as an X-ray for your digital security. It delves into the complex architecture of passwords, exposing vulnerabilities that might otherwise lurk in the shadows. Here's why it's crucial:

Identifying Leaked Credentials

Unmasking Weak Links

Reused Passwords

Building A Fortress, Not A Cardboard Castle

In the face of sophisticated cyber threats, relying on flimsy passwords is akin to building a sandcastle against a tidal wave. Password analysis equips us with the tools and knowledge to construct fortresses of digital security. By proactively identifying and addressing vulnerabilities, we can safeguard our precious data and maintain control over our online lives.

Last Updated On 2024-03-07
Was this page helpful?
Last Updated On 2024-03-07
Was this page helpful?

Identity And Access Management

Use Telivy to Create and Manage Passwords

Password Management

In today's hyper-connected world, passwords are the keys to our digital kingdom. Yet, just like a rusty lock weakens a fortress, weak passwords expose our personal and professional lives to an ever-evolving landscape of cyber threats. That's where password analysis becomes our digital sentinel, standing guard against malicious actors and ensuring our data remains secure.

Password Capture

The Telivy platform captures passwords from users to analyse them for weaknesses (next section). When deploying the Telivy executable, a password analysis capture tool is deployed to securely analyse the passwords stored in the user's chromium based browsers. Because of how chromium encrypts passwords, a user has to be logged to capture the passwords or the capture will be triggered once the user(s) log in.

To reduce any liability for you, we perform password analysis on the device and the clear text passwords are never stored in our servers. Telivy however stores the hash of the password. Hashes cannot be reverse engineered to generate the password.

If the executable is deployed as an admin, the executable will schedule password capture for most of the users that are present on the asset. The list of users is determined by the folder structure, Microsoft Azure AD user setup, local and global users configured on the system and a few different heuristics. In some cases, not all users are covered for password analysis. The assets table should show you the list of users the password analysis is scheduled for.

Image alt text
Image alt text

If the executable is deployed as a non admin, the executable will schedule password capture for only the current user that has executed the binary.

Why Analyze Passwords? It's More Than Just "123456"

Think of password analysis as an X-ray for your digital security. It delves into the complex architecture of passwords, exposing vulnerabilities that might otherwise lurk in the shadows. Here's why it's crucial:

Identifying Leaked Credentials

Unmasking Weak Links

Reused Passwords

Building A Fortress, Not A Cardboard Castle

In the face of sophisticated cyber threats, relying on flimsy passwords is akin to building a sandcastle against a tidal wave. Password analysis equips us with the tools and knowledge to construct fortresses of digital security. By proactively identifying and addressing vulnerabilities, we can safeguard our precious data and maintain control over our online lives.

Last Updated On 2024-03-07}
Was this page helpful?
Last Updated On 2024-03-07}
Was this page helpful?

Identity And Access Management

Use Telivy to Create and Manage Passwords

Password Management

In today's hyper-connected world, passwords are the keys to our digital kingdom. Yet, just like a rusty lock weakens a fortress, weak passwords expose our personal and professional lives to an ever-evolving landscape of cyber threats. That's where password analysis becomes our digital sentinel, standing guard against malicious actors and ensuring our data remains secure.

Password Capture

The Telivy platform captures passwords from users to analyse them for weaknesses (next section). When deploying the Telivy executable, a password analysis capture tool is deployed to securely analyse the passwords stored in the user's chromium based browsers. Because of how chromium encrypts passwords, a user has to be logged to capture the passwords or the capture will be triggered once the user(s) log in.

To reduce any liability for you, we perform password analysis on the device and the clear text passwords are never stored in our servers. Telivy however stores the hash of the password. Hashes cannot be reverse engineered to generate the password.

If the executable is deployed as an admin, the executable will schedule password capture for most of the users that are present on the asset. The list of users is determined by the folder structure, Microsoft Azure AD user setup, local and global users configured on the system and a few different heuristics. In some cases, not all users are covered for password analysis. The assets table should show you the list of users the password analysis is scheduled for.

Image alt text
Image alt text

If the executable is deployed as a non admin, the executable will schedule password capture for only the current user that has executed the binary.

Why Analyze Passwords? It's More Than Just "123456"

Think of password analysis as an X-ray for your digital security. It delves into the complex architecture of passwords, exposing vulnerabilities that might otherwise lurk in the shadows. Here's why it's crucial:

Identifying Leaked Credentials

Unmasking Weak Links

Reused Passwords

Building A Fortress, Not A Cardboard Castle

In the face of sophisticated cyber threats, relying on flimsy passwords is akin to building a sandcastle against a tidal wave. Password analysis equips us with the tools and knowledge to construct fortresses of digital security. By proactively identifying and addressing vulnerabilities, we can safeguard our precious data and maintain control over our online lives.

Last Updated On 2024-03-07
Was this page helpful?
Last Updated On 2024-03-07
Was this page helpful?
ON THIS PAGE
Password Management
Password Capture
Why Analyze Passwords? It's More Than Just "123456"
Identifying Leaked Credentials
Unmasking Weak Links
Reused Passwords
Building A Fortress, Not A Cardboard Castle
Back to top