Pro+ Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
August 2012

Deep dive into authentication methods and best practices

Sponsored by SearchSecurity.com

Is your token authentication vulnerable to exploit or attack? In this handbook, discover how to lock down two-factor authentication methods in the enterprise. Then, we look at authentication methods such as two-factor tokens, biometrics and cloud-based options. We'll also help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole, and how you can replace the ubiquitous authenticator in your business.

Table Of Contents

  • Two-factor authentication: Preventing token exploits
  • Password alternatives: Replacing the ubiquitous authenticator
  • Windows 8: Cloud-based authentication options
  • Case study: Bank of India's two-factor authentication solution

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close