Security Secure user authentication: Regulations, implementation and methods:
Identity and Access Management Security School
Secure user authentication: Regulations, implementation and methods
When deploying any authentication option – whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls – businesses need to weigh several factors when deciding the best option. In this lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, helps you understand the FFIEC's mandate, choose an authentication option for diverse user communities, and solidify an authentication strategy.
-
Identity and Access Manag - Take this quiz to see how much you've learned in the Authentication lesson of Identity and Access Management Security School.
-
Authentication in the real world: Moving from strategy to implementation
Tip - It's a common headache for security administrators. Management wants to roll out a strong authentication system across a heterogeneous IT environment. The biggest challenge is often effectively weaving an authentication plan into diverse directories,...
Security Management Strategies for the CIO