Biometrics for Global Web Authentication: An Open Source Java/J2EE-Based Approach

  • Source: GE
  • Written By:
  • Published:
  • (Originally Published On:) )
Recently, companies have been working on integrating biometric verification capabilities using open source single-sign-on techniques. The main idea behind this integration is to take advantage of the infrastructure provided by a Central Authentication Service (CAS) to offer single-sign-on Web authentication, while improving security beyond basic mechanisms based on login and password. Find out more.

Featured Software Research:

Usability as an ERP Selection Criteria

  • Source: IFS
  • Written By:
  • Published:
Enterprise resource planning (ERP) software is often criticized for being complex and difficult to use—which puts up a barrier to receiving potential benefits. Systems with integrated search functionality and Web-like interfaces can make ERP solutions easier to use. Learn how to evaluate ERP software for its usability, so you can avoid investing in platforms that aren’t evolved toward usable and efficient interfaces. Read More

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More

Property Developer Builds Online Sales Success

Peet Limited is Australia’s largest specialist residential land developer, managing around 70 company-owned, syndicated, and joint-venture projects. Peet has significantly enhanced its Web-based property sales success rates thanks to a customer relationship management (CRM) solution hosted and supported by Zavanti. Today approximately 50 percent of all of Peet’s property sales are generated from its online CRM solution. Read More

You may also be interested in these related documents:

When Passwords Aren't Enough: The Need for Strong Online Authentication That Is Easy to Use

For public-facing Web sites or those with a large consumer audience, finding a way to implement strong security that is easy to use is a great challenge. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. Increase your Web site security now. Read More

Smart Enterprise Single Sign-on (ESSO)

The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost. Read More

Wetmetrics

The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse... Read More
 
comments powered by Disqus