PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
January 2006

Authentication: TriCipher Armored Credential System v3.1.1

TriCipher Armored Credential System v3.1.1 TriCipher Price: Base price is $250,000 for 25,000 users and includes three appliances, management tools and APIs   TriCipher Armored Credential System v3.1.1 TriCipher Armored Credential System offers highly secure authentication management for large enterprises.  Authentication systems are increasingly under attack, and organizations are scrambling to deploy secure but easy-to-use systems that won't quickly become obsolete. TriCipher's TriCipher Armored Credential System (TACS) v3.1.1 offers a clever solution using multi-part credentials. TACS is intended for organizations that need a highly available product to quickly authenticate thousands of users--and it's priced accordingly. Its implementation features a three-appliance mirrored configuration and includes several APIs that can be used to expand functionality (e.g., using TACS as a secure vault for sensitive information). TriCipher claims TACS can handle up to 5 million users and 450,000 authentications per hour. One part of a ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Mining NetFlow

    Your routers and switches can yield a mother lode of security information about your network--if you know where to dig

  • Help From Above

    Security managers are looking to the keepers of the Internet cloud for relief.

  • Secure communications

    by  Dr. Juergen Schneider

    This tip covers ways that you can secure a network to protect data from internal as well as external attacks.

Columns in this issue