The Evolution of Strong Authentication

  • Source: Quocirca Ltd
  • Written By:
  • Published:
  • (Originally Published On:) )
Strong authentication technologies have long been used to provide an extra layer of assurance that individuals accessing computing resources are who they say they are. However, the cost of deploying and managing such systems has made their use expensive and complex. New authentication models— and methods such as software, SMS, and BlackBerry tokens—are are taking the costs out of using strong authentication. Find out how.

Featured Software Research:

The Ultimate Guide to E-commerce on Salesforce1

This white paper looks at the strong technical foundation that the Salesforce1 Platform offers for e-Commerce initiatives. It examines Apttus E-Commerce, which is built on the Salesforce1 Platform and provides enterprises immediate access to innovative, comprehensive e-commerce functionality. Find out how you can accelerate pricing, quoting, and sales processes, use price configuration as a strategic advantage, optimize deals, and more. Read More

Understanding ERP Deployment Choices

Enterprise resource planning (ERP) systems were once deployed as monolithic systems running in local data centers. Today, there are a multitude of ERP deployment strategies: single-system, cloud-based, operational, peer, hybrid, and multilevel approaches. Advances in ERP system design, the advent of cloud computing, and the ongoing evolution of business are among the key factors driving this proliferation of choices. Read More

Understanding ERP Deployment Choices

Enterprise resource planning (ERP) systems were once deployed as monolithic systems running in local data centers. Today, there are a multitude of ERP deployment strategies: single-system, cloud-based, operational, peer, hybrid, and multilevel approaches. Advances in ERP system design, the advent of cloud computing, and the ongoing evolution of business are among the key factors driving this proliferation of choices. Read More

You may also be interested in these related documents:

When Passwords Aren't Enough: The Need for Strong Online Authentication That Is Easy to Use

For public-facing Web sites or those with a large consumer audience, finding a way to implement strong security that is easy to use is a great challenge. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. Increase your Web site security now. Read More

20 Practical Tips on Authentication and Access Management from Practiced Professionals

You know your organization’s need for stronger IT security can’t wait any longer. Regulatory compliance and the risk of a data breach are forcing you to implement more stringent security procedures. But password problems still consume time and money. Though the benefits of single sign-on (SSO) and strong authentication are significant, deploying an IT security solution can be daunting. Get tips on how to go about it. Read More

Enterprise Authentication: Increasing Security without Breaking the Bank

As the number of remote and mobile workers grows, new security practices highlight the need for strong authentication. Today, passwords aren’t enough protection against unauthorized access. How can you increase authentication security while preserving operational and budget efficiency? Learn about the challenges of identity authentication, and the versatile solutions that can help prevent the risk of breaches and attacks. Read More
 
comments powered by Disqus