Password Management Survey: The Impact of Password Policies

While the growing trend among companies today is to implement stronger password policies to increase network security, it seems that many still struggle with finding the most cost-effective solution. Read about what a recent survey of over 600 IT professionals discovered about password policies, and find out why implementing a low-risk, cost-effective, and secure password management solution is just what you need.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

The ROI of Talent Management

Over the past decade, talent management initiatives have become one of the top priorities within global organizations. While the business value of talent management investments is often recognized discretely through increased efficiency, organizations have frequently found it challenging to quantify the actual business impact or return on investment of their talent management initiatives.
  • Written By:
  • Published On:

The 14-Step Guide to Building a Performance Management Framework in Field Service Organizations

When rolling out a mobile workforce management system, performance management is often the last thing to implement. But that’s not what should happen. Because performance management is a continuous effort that has a direct impact on your people, processes, and systems, start your performance management initiative today by following 14 steps to building a performance management framework for your field service organization.
  • Written By:
  • Published On:

Top 3 Reasons to Replace Your Mobile Workforce Management Solution

Are you considering replacing your mobile workforce management solution? A recent TechValidate survey ranked the top challenges that caused the surveyed organizations to implement ViryaNet's mobile workforce management (MWM) solution or replace their MWM solution with ViryaNet’s solution. Read on to find out what the top three challenges were for these companies and how to address these when selecting a new MWM.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Compliance and Privileged Password Management

Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help.
  • Written By:
  • Published On:

Enterprise Password Management: A Guide for Best Practices

It seems that these days you need a password for everything. And with so many to remember, it’s no wonder helpdesks are bombarded with calls that tie up the IT department’s resources. Password inflation and the resulting fatigue increasingly frustrate not only end users, but the support teams that deal with the fallout of strict password polices as well. Find out how some businesses are putting an end to this madness.
  • Written By:
  • Published On:

Wetmetrics

The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application.
  • Written By:
  • Published On: