Access "Single Sign-On"
This article is part of the September 2005 issue of What's the best IT security advice you've ever received?
Imprivata's OneSign 2.8 Imprivata Price: Starts at $16,000 for 200 users Passwords are infosecurity's Achilles Heel. Weak passwords--your pet's name or mother's maiden name-- are easy to remember and easy to guess. Strong passwords are hard to remember, spawning myriad help desk calls and notes stuck on monitors for the world to see. Single sign-on (SSO) products address many of the security and administrative headaches, but complexity and cost of implementation can put them out of reach of many organizations. Imprivata's OneSign is SSO for the rest of us, with an innovative technology that makes adding almost any application a snap. The star of the OneSign package is its powerful yet intuitive Application Profile Generator (APG), which "learns" virtually any application and can recognize when OneSign should enter the credentials. It sets itself apart by doing away with manually scripted login procedures, saving time, money and frustration. In our lab, we easily generated several application profiles without even opening the APG guidebook. We succeeded with ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
SSL VPN: Aventail's EX-1500
A review of Aventail's EX-1500
-
Sunbelt Software's CounterSpy Enterprise 1.5 Product Review
In this product review, get the pros and cons of Sunbelt Software's CounterSpy Enterprise 1.5 features, such as antispyware scanning, centralized logging and reporting.
-
Single Sign-On
Imprivata's OneSign 2.8
-
Sizing up e-mail appliances
by Tom Bowers, Contributor
Information Security magazine tests four e-mail appliances designed to clear the way for safe messaging. Here's how they measured up.
-
Top 5 Hacker Tools: Google hacker, password cracker, WLAN detector
by Ed Skoudis, Contributor
Read about five must-have hacker tools: WikTo, a Web scanner and Google hacking tool; Paros Proxy, a Web application manipulation proxy; Cain and Abel, a password sniffer/cracker; Winfingerprint, a Windows configuration harvester; and Wellenreiter, a passive WLAN detector. Get a feel for their capabilities, and then carefully incorporate each into your assessment methodology.
-
SSL VPN: Aventail's EX-1500
-
-
Hot Pick: Aladdin Knowledge Systems' eSafe 5
Aladdin Knowledge Systems' eSafe 5
-
Recent Releases: Security product briefs, September 2005
Read about security products that launched in September 2005.
-
A Field Guide to Passive Reconnaissance and Indirect Attacks
Read a review of the security book: Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks.
-
Best Advice
In this must-read compilation, we asked security luminaries to share their anecdotes, professional wisdom and success stories.
-
Hot Pick: Aladdin Knowledge Systems' eSafe 5
-
Columns
-
Perspectives: Mergers and acquisitions open security risks
Integrating infrastructures acquired from other companies without considering security and risk first exposes enterprises to myriad problems.
-
Layer 8: Choose your risk awareness battles carefully
Read at Your Own Risk
-
Ping: Phil Zimmerman
Phil Zimmerman
-
Publisher's Note
Getting It Together
-
Perspectives: Mergers and acquisitions open security risks
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO