Access "SaaS Offering Handles SSO"
This article is part of the May 2008 issue of Seven questions to ask before committing to SaaS
New Password Hell? Proliferation of software-as-a-service offerings spawns new issues. The software-as-a-service (SaaS) model pervades business, reducing management headaches and cutting infrastructure and maintenance costs. It's so pervasive that authenticating to multiple Web-based applications raises its own issues, as users and admins struggle with multiple passwords to Internet applications and security problems like password cracking, phishing and man-in-the middle attacks. One possible solution is yet another SaaS offering. TriCipher, which launched TACS (TriCipher Armored Credential System) a couple of years ago to provide strong, easy-to-deploy authentication for environments serving thousands of users. Its myOneLogin service leverages TACS' scalability to provide secure authentication and single sign-on (SSO) for multiple Web apps. WebEx is among the SaaS providers supported out-of-the-box (Salesforce. com and Google Apps are among the headline business apps, and TriCipher recently added consumer applications including Amazon, Yahoo, PayPal and ... Access >>>
Premium Content for Free.
SaaS Offering Handles SSO
TechFocus: New Password Hell?
- Viewpoint: Let's add policy to GRC
Product review: CodeArmor 2.2 for Microsoft .NET
by Steven Weil, Contributor
The configuration, policy control and reporting capabilities of V.i. Labs' CodeArmor 2.2 for Microsoft .NET are reviewed.
Security Services: Webroot Email Security SaaS
At Your Service
Identity Management Suites Enable Integration, Interoperability
IDENTITY MANAGEMENT Feature-rich product suites are putting a face on integration and interoperability.
- SaaS Offering Handles SSO
Secure Computing SafeWord 2008 product review
Secure Computing SafeWord 2008 delivers identity management and access control for Windows systems using tokens that generate secure single-use passcodes. Information Security magazine reviews these capabilities.
7 Security Questions to Ask Your SaaS Provider
Outsourcing software as a service (SaaS) puts control over an organization's applications in the hands of others. Learn what questions to ask your provider, how to define security policies, how to understand how service providers handle security and ensure enforcement of policies.
Product review: Symantec Database Security 3.1
5 Steps for Developing Strong Change Management Program Best Practices
Poor change control and configuration management can affect the security of your systems and networks. Follow these five steps for a strong change management program.
Product review: Mandiant Intelligent Response 1.0
- Secure Computing SafeWord 2008 product review
Interview: Jim Kirkhope of NCR
PING: Jim Kirkhope
Face-Off: Is vulnerability research ethical?
Bruce Schneier and Marcus Ranum debate the ethics of vulnerability research
Reasearch on Coding Backdoors Presents Ugly Picture
Editor's Desk: Backdoor Bedlam
Security, Privacy Offices Must Combine Resources
Perspectives: Nowhere to Hide
- Interview: Jim Kirkhope of NCR
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...