How Secure Is a Password?

Is it true that companies in Europe are more concerned with security, while those in the US are more concerned with productivity? Maybe. However, there’s a trend in the US toward safer log-on, authentication, and authorization. In the next few years, both aspects may converge as the US will be more security-concerned, while the rest of the world will be concerned about ease of use and productivity gains. Learn more.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Why Performance Management? A Guide for the Midsize Organization

Midsize companies must rapidly grasp the issues influencing business performance, and secure the resources to deal with them efficiently and effectively. Managers need to access the data that can give them the insight to grow revenue, reduce operating costs, and improve processes. But data is often siloed in disconnected systems. Learn how to break your dependence on spreadsheets and attain better insight and performance.
  • Written By:
  • Published On:

Linked Enterprise Data: Data at the heart of the company

The data silos of today's business information systems (IS) applications, and the pressure from the current economic climate, globalization, and the Internet make it critical for companies to learn how to manage and extract value from their data. Linked enterprise data (LED) combines the benefits of business intelligence (BI), master data management (MDM), service-oriented architecture (SOA), and search engines to create links among existing data, break down data walls, provide an open, secure, and long-term technological environment, and reduce complexity—read this white paper to find out how.
  • Written By:
  • Published On:

Deploy Tactical, Affordable, Scalable Analytics

Self-service solutions empower business users to drive decision making. IBM analytics solutions are easy to install, configure, manage, and secure, and they scale to a broad set of users. Leaders have access to data across the business. These solutions deliver a unified experience across Web, mobile, and desktop, including solutions for reporting, analysis, predictive analytics, planning, forecasting, and regulatory reporting.
  • Written By:
  • Published On: December 2013

You may also be interested in these related documents:

Compliance and Privileged Password Management

Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help.
  • Written By:
  • Published On:

Password Management Survey: The Impact of Password Policies

While the growing trend among companies today is to implement stronger password policies to increase network security, it seems that many still struggle with finding the most cost-effective solution. Read about what a recent survey of over 600 IT professionals discovered about password policies, and find out why implementing a low-risk, cost-effective, and secure password management solution is just what you need.
  • Written By:
  • Published On:

Wetmetrics

The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application.
  • Written By:
  • Published On: