In this lesson, Mark Diodati, identity and privacy strategies analyst for Burton Group, outlines the new product and technology choices available and identifies what offerings make sense for your organization's needs.
| MAIN MENU | ||||||
| IAM Security School Home | |||||||
| The new school of enterprise authentication | |||||||
| Future authentication technologies | |||||||
| Using IAM tools to improve compliance | |||||||
| Endpoint security protection | |||||||
| VPNs and remote access | |||||||
| Automated provisioning | |||||||
| Building an IAM architecture | |||||||
| Secure user authentication | |||||||
| Building network security | |||||||
| Sponsored by VeriSign: Security in the any era: Balancing risk, cost and the user experience |
Webcast: The buyers' guide to stronger authentication
Length: 50 minutes
With the plethora of options and various price ranges, choosing a second form of authentication can be confusing.
This webcast will:
Technical article: How to choose the right smart card
The ISO 7816 form factor is the most commonly deployed smart card in the enterprise, but it's not always the best option. In fact, those looking for desktop simplicity and lower costs may want to consider an alternative smart card.
Podcast: Countdown -- Top 5 consumer authentication technologies on the market today
Length: 12 minutes
In late 2005, the Federal Financial Institutions Examination Council (FFIEC) issued guidance stating single-factor authentication was no longer adequate for securing online banking transactions. This guidance did not specify what types of technologies would meet the requirement, but many vendors have scrambled to develop cost-effective and easy product offerings that can be deployed to the masses. Which types of products have emerged above others? This podcast will count down the top five vendor options available when it comes to consumer Web authentication.
Quiz: Next-generation authentication
Take this five-question quiz to see how much you've learned about next-generation authentication.
About the instructor
| ||||||
This was first published in May 2007
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation