Password Management Survey: The Impact of Password Policies

  • Source: Siber Systems
  • Written By:
  • Published:
  • (Originally Published On:) )
While the growing trend among companies today is to implement stronger password policies to increase network security, it seems that many still struggle with finding the most cost-effective solution. Read about what a recent survey of over 600 IT professionals discovered about password policies, and find out why implementing a low-risk, cost-effective, and secure password management solution is just what you need.

Featured Software Research:

Putting the "I" in CRM Series 1: The Impact to the Sales Team

Customer relationship management (CRM) has long been seen as a must-have sales tool. However, much of the value of traditional CRM accrues to managers, not the reps that use them daily. Learn how CRM designed for the individual benefits the entire sales organization from increased data quality to more predictable revenue pipelines. Read More

Minimizing the Cost and Impact of a Recall

When a recall occurs, every second counts. Without being able to quickly access all records of inventory movement, tracking information becomes expensive, laborious, and time-consuming. This white paper outlines which features you might be missing in your cloud enterprise resource planning (ERP) system, including data management, full traceability, and active compliance. Read More

Minimizing the Cost and Impact of a Recall

When a recall occurs, every second counts. Without being able to quickly access all records of inventory movement, tracking information becomes expensive, laborious, and time-consuming. This white paper outlines which features you might be missing in your cloud enterprise resource planning (ERP) system, including data management, full traceability, and active compliance. Read More

You may also be interested in these related documents:

Compliance and Privileged Password Management

Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help. Read More

Enterprise Password Management: A Guide for Best Practices

It seems that these days you need a password for everything. And with so many to remember, it’s no wonder helpdesks are bombarded with calls that tie up the IT department’s resources. Password inflation and the resulting fatigue increasingly frustrate not only end users, but the support teams that deal with the fallout of strict password polices as well. Find out how some businesses are putting an end to this madness. Read More

Wetmetrics

The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application. Read More
 
comments powered by Disqus