Home
 > Research and Reports > White Papers > Password Management Survey: The Impact of Password Po...

Password Management Survey: The Impact of Password Policies

Source: Siber Systems
While the growing trend among companies today is to implement stronger password policies to increase network security, it seems that many still struggle with finding the most cost-effective solution. Read about what a recent survey of over 600 IT professionals discovered about password policies, and find out why implementing a low-risk, cost-effective, and secure password management solution is just what you need.


Featured publications:

The ROI of Talent Management
Source: Cornerstone OnDemand Over the past decade, talent management initiatives have become one of the top priorities within global organizations. While the business value of talent management investments is often recognized discretely through increased efficiency, organizations have frequently found it challenging to quantify the actual business impact or return on investment of their talent management initiatives. Read More...
The 14-Step Guide to Building a Performance Management Framework in Field Service Organizations
Source: ViryaNet When rolling out a mobile workforce management system, performance management is often the last thing to implement. But that’s not what should happen. Because performance management is a continuous effort that has a direct impact on your people, processes, and systems, start your performance management initiative today by following 14 steps to building a performance management framework for your field service organization. Read More...
Top 3 Reasons to Replace Your Mobile Workforce Management Solution
Source: ViryaNet Are you considering replacing your mobile workforce management solution? A recent TechValidate survey ranked the top challenges that caused the surveyed organizations to implement ViryaNet's mobile workforce management (MWM) solution or replace their MWM solution with ViryaNet’s solution. Read on to find out what the top three challenges were for these companies and how to address these when selecting a new MWM. Read More...


You may also be interested in these related documents:

Compliance and Privileged Password Management
Source: e-DMZ Security Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help. Read More...
Enterprise Password Management: A Guide for Best Practices
Source: Siber Systems It seems that these days you need a password for everything. And with so many to remember, it’s no wonder helpdesks are bombarded with calls that tie up the IT department’s resources. Password inflation and the resulting fatigue increasingly frustrate not only end users, but the support teams that deal with the fallout of strict password polices as well. Find out how some businesses are putting an end to this madness. Read More...
Wetmetrics
Source: Queue Global Information Systems Corp. The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.