Home
 > Research and Reports > White Papers > Password Management Survey: The Impact of Password Po...

Password Management Survey: The Impact of Password Policies

Source: Siber Systems
While the growing trend among companies today is to implement stronger password policies to increase network security, it seems that many still struggle with finding the most cost-effective solution. Read about what a recent survey of over 600 IT professionals discovered about password policies, and find out why implementing a low-risk, cost-effective, and secure password management solution is just what you need.


Featured publications:

Unified Human Capital Management and Talent Technology Survey Report: How Human Capital and Talent Technology Are Influencing Global Business
Source: Oracle This Unified Human Capital Management and Talent Technology Survey Report addresses how businesses are using human capital management (HCM) to meet their growth goals. The survey results are representative of large and smaller enterprises and reflect the input of 126 respondents.

By downloading this document, you agree to provide contact information and other data to select sponsors of this content. Read More...
Top 3 Reasons to Replace Your Mobile Workforce Management Solution
Source: ViryaNet Are you considering replacing your mobile workforce management solution? A recent TechValidate survey ranked the top challenges that caused the surveyed organizations to implement ViryaNet's mobile workforce management (MWM) solution or replace their MWM solution with ViryaNet’s solution. Read on to find out what the top three challenges were for these companies and how to address these when selecting a new MWM. Read More...
A Guide to Transactional Email
Source: Dynamic Network Services It’s well known that transactional email is used to send out shipping notices or password resets, but did you know that due to its high click-through rates, it can be a great way to communicate with your customers? With this guide, find out what you might be missing in your transactional emails. Read More...


You may also be interested in these related documents:

Compliance and Privileged Password Management
Source: e-DMZ Security Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help. Read More...
Enterprise Password Management: A Guide for Best Practices
Source: Siber Systems It seems that these days you need a password for everything. And with so many to remember, it’s no wonder helpdesks are bombarded with calls that tie up the IT department’s resources. Password inflation and the resulting fatigue increasingly frustrate not only end users, but the support teams that deal with the fallout of strict password polices as well. Find out how some businesses are putting an end to this madness. Read More...
Wetmetrics
Source: Queue Global Information Systems Corp. The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.