Identity and Access Manag

Future authentication technologies: How to choose the right product


SearchSecurity.com Security School
While strong authentication has been around for years, new regulations such as FFIEC and HSPD-12 are fueling renewed interest in the technology. As a result, many established vendors and young startups are offering a wide range of new authentication products. Many offer innovative and cost-effective approaches, but how do they compare with each other and how should you go about determining which product would best suit your business?

In this lesson, Mark Diodati, identity and privacy strategies analyst for Burton Group, outlines the new product and technology choices available and identifies what offerings make sense for your organization's needs.

   Webcast: The buyers' guide to stronger authentication

   Technical article: How to choose the right smart card

   Podcast: Countdown -- Top 5 consumer authentication technologies on the market today

   Quiz: Next-generation authentication

   About the instructor

MAIN MENU
IAM Security School Home
The new school of enterprise authentication
Future authentication technologies
Using IAM tools to improve compliance
Endpoint security protection
VPNs and remote access
Automated provisioning
Building an IAM architecture
Secure user authentication
Building network security
Sponsored by VeriSign:
Security in the any era: Balancing risk, cost and the user experience



 

Webcast: The buyers' guide to stronger authentication
Length: 50 minutes
With the plethora of options and various price ranges, choosing a second form of authentication can be confusing.
This webcast will:

  • Outline new authentication technologies including OTPs, smart cards, USB smart cards, password hardening, mobile PKI and risk analytics
  • Review the benefits of these technologies to organizations. What use cases provide the best fit?
  • Explain how to get what you pay for: examples of differences between products in the same product class
  • Demonstrate why identity assurance should be the primary goal of a strong authentication deployment
  • Offer guidance on getting stronger authentication deployments right

     

    Technical article: How to choose the right smart card
    The ISO 7816 form factor is the most commonly deployed smart card in the enterprise, but it's not always the best option. In fact, those looking for desktop simplicity and lower costs may want to consider an alternative smart card.

     

    Podcast: Countdown -- Top 5 consumer authentication technologies on the market today
    Length: 12 minutes
    In late 2005, the Federal Financial Institutions Examination Council (FFIEC) issued guidance stating single-factor authentication was no longer adequate for securing online banking transactions. This guidance did not specify what types of technologies would meet the requirement, but many vendors have scrambled to develop cost-effective and easy product offerings that can be deployed to the masses. Which types of products have emerged above others? This podcast will count down the top five vendor options available when it comes to consumer Web authentication.

     

    Quiz: Next-generation authentication
    Take this five-question quiz to see how much you've learned about next-generation authentication.

    About the instructor
    Mark Diodati
    Mark Diodati, CPA, CISA, CISSP, MCP, CISM, has more than 15 years of experience in the development and deployment of information security technologies. He has served as vice president of worldwide IAM for CA, as well as senior product manager for RSA Security's smart card, SSO, UNIX security, mobile PKI and file encryption products. He has had extensive experience implementing information security systems for the financial services industry since starting his career at Arthur Andersen & Co. He is a frequent speaker at information security conferences, a contributor to numerous publications, and has been referenced as an authority on IAM in a number of academic and industry research publications.

    This was first published in May 2007

  • Join the conversationComment

    Share
    Comments

      Results

      Contribute to the conversation

      All fields are required. Comments will appear at the bottom of the article.