Home
 > Research and Reports > White Papers > Smart Card for Global Enterprise Authentication

Smart Card for Global Enterprise Authentication

Source: GE
Smart-card technology is an industry standard defined and controlled by the Joint Technical Committee 1 (JTC1) of the International Standards Organization (ISO) and the International Electronic Committee (IEC). Standards introduced in 1987 and updated in 2003 define attributes of a smart card—including physical characteristics, transmission protocols, security architecture, and common data elements. Find out more.


Featured publications:

The 8 Ways Outdated ERP Damages Your Business
Source: NetSuite In today's market, enterprise resource planning (ERP) systems need to adapt quickly to changing conditions. Download this white paper to find out how outdated systems drain your IT budget, how to ensure that your ERP systems keep pace with the demands of a global mobile business, and four reasons why companies are turning to the cloud to keep up. Read More...
Selecting ERP for Oil and Gas Industry Contractors and Vendors
Source: IFS Suppliers to the oil and gas industry are under more pressure than ever before to increase quality, collaborate closely with the customer, and take on more project risk. Learn how enterprise resource planning (ERP) helps engineers procure construction companies, equipment fabricators, and service providers to meet the new demands from oil and gas companies. Download this white paper to learn more. Read More...
Mzinga’s OmniSocial Learning Platform Enables Global Change for TripAdvisor
Source: Mzinga Find out how leadership, technology, collaboration, and an agile business partnership created success for TripAdvisor’s global learning and development team. Read More...


You may also be interested in these related documents:

When Passwords Aren't Enough: The Need for Strong Online Authentication That Is Easy to Use
Source: Confident Technologies For public-facing Web sites or those with a large consumer audience, finding a way to implement strong security that is easy to use is a great challenge. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. Increase your Web site security now. Read More...
Smart Enterprise Single Sign-on (ESSO)
Source: SECUDE International AG The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost. Read More...
Wetmetrics
Source: Queue Global Information Systems Corp. The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.