Access "Single Sign-On Explained"
This article is part of the August 2006 issue of Special manager's guide: Monitoring identities
Single sign-on can reduce help desk calls and improve the user experience. Snapshot WAM registers with hospital For David Young, Geisinger Health System's information technology program director, using a Web access management solution was a good diagnosis. As a health care provider, the company wanted to improve patient satisfaction and save time and resources by getting patients to update information such as address or insurance changes. That was four years ago. Today patients can view their medical reports, lab results and schedule doctor appointments. The original rollout of RSA Security's Access Manager took six to eight months as Geisinger needed to iron out security policies that would be reasonable for an external user (internal policies may not have been applicable). The team included IT staff specializing in Web services, network infrastructure, firewalls and desktop applications, a HIPAA officer and internal auditor, among others. Initially Geisinger would only sign up people who came to its clinic and could verify their identity with a picture ID.... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
- What's a Hot Pick?
-
Single Sign-On Explained
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
1 is the loveliest number -
It's a Dirty Job...
SERVICES But someone has to handle vulnerability management. Giving it to an outsourcer seems like an easy solution, but enterprises need to first understand the gritty details.
-
Security Event Management
Check Point Software Technologies' Eventia Analyzer 2.0 and Eventia Reporter
-
Web Application Break-In
THREATS It's time to protect online assets from increasing attacks.
-
Buyers look for demonstrable success in innovative companies
Cool Tech Ain't Enough.
-
Akonix Systems' Akonix A-Series Product Review
In this product review, get information on instant messaging (IM) Akonix Systems' Akonix A-Series appliance. Get tips on configuration, installation, reporting and policy control.
-
Vendor Security Product News and Updates
Learn about the latest products and security updates from vendors like Crossbeam, Airmagent and Marshal. Get pricing information as well as setup and installation tips.
-
- At Your Service: August 2006 managed services security news
- Events: Information security conferences for August 2006
-
User authentication options: Using two factor authentication for security
Discover how using two-factor authentication can improve organizational security. Weigh your authentication options and choose the right product for your enterprise.
-
Three Pitfalls to Avoid
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
3 strikes, you're out -
IDP/Network Access Control
ForeScout Technologies' CounterACT
-
Secure Reads: Steganography and the art of covert communication
Read a quick review of the book, Hiding in Plain Sight: Steganography and the Art of Covert Communication.
-
Instant Messaging: Symantec IM Manager 8.0
Symantec's IM Manager 8.0
-
Columns
-
Editor's Desk: Consolidation is in
Synergistic Solutions
-
Layer 8: Personal devices put enterprise data at risk
Creeping Consumerization
-
Perspectives: Frame security as a business concept
Security efforts are considered operational, even when CISOs manage to interact with executives.
-
Ping: Heidi Kujawa
Heidi Kujawa
-
Editor's Desk: Consolidation is in
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO