Smart Card for Global Enterprise Authentication

  • Source: GE
  • Written By:
  • Published:
  • (Originally Published On:) )
Smart-card technology is an industry standard defined and controlled by the Joint Technical Committee 1 (JTC1) of the International Standards Organization (ISO) and the International Electronic Committee (IEC). Standards introduced in 1987 and updated in 2003 define attributes of a smart card—including physical characteristics, transmission protocols, security architecture, and common data elements. Find out more.

Featured Software Research:

Selecting ERP for Oil and Gas Industry Contractors and Vendors

  • Source: IFS
  • Written By:
  • Published:
Suppliers to the oil and gas industry are under more pressure than ever before to increase quality, collaborate closely with the customer, and take on more project risk. Learn how enterprise resource planning (ERP) helps engineers procure construction companies, equipment fabricators, and service providers to meet the new demands from oil and gas companies. Download this white paper to learn more. Read More

Case Study: IGX Global Corp

IGX Global provides solutions to develop, deploy, and sustain effective long-term network and information security plans. This case study identifies the business issues that IGX Global was able to overcome using FinancialForce supply chain management (SCM). Learn about the project results. Read More

Using ERP for Process Manufacturing Quality Management

  • Source: IFS
  • Written By:
  • Published:
Today, process manufacturing executives need to think about more than core batch and recipe management capabilities when considering software solutions like enterprise resource planning (ERP). Due to both regulatory and market factors, quality management and documentation of the quality and content of goods produced is essential. Advancing environmental awareness and the ability to handle recalls both factor into this increased focus on quality.

Customers have high expectations of manufacturers and other suppliers and often focus on good corporate behaviors, especially when it comes to sustainability. Adherence to legislation is of course necessary—but manufacturers who go beyond the required can find this to be a competitive advantage.

As supply chains and distribution patterns become more global, more process manufacturers also need to pay attention to and comply with numerous national and regional regulations.

This white paper outlines how batch process manufacturers can select and use enterprise software with embedded quality management functionality to face these challenges. Read More

You may also be interested in these related documents:

When Passwords Aren't Enough: The Need for Strong Online Authentication That Is Easy to Use

For public-facing Web sites or those with a large consumer audience, finding a way to implement strong security that is easy to use is a great challenge. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. Increase your Web site security now. Read More

Smart Enterprise Single Sign-on (ESSO)

The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost. Read More

Wetmetrics

The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application. Read More
 
comments powered by Disqus