Security Secure user authentication: Regulations, implementation and methods:

Identity and Access Management Security School

Secure user authentication: Regulations, implementation and methods

When deploying any authentication option – whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls – businesses need to weigh several factors when deciding the best option. In this lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, helps you understand the FFIEC's mandate, choose an authentication option for diverse user communities, and solidify an authentication strategy.

Display in sets of:
  • Authentication quiz

    Identity and Access Manag -  Take this quiz to see how much you've learned in the Authentication lesson of Identity and Access Management Security School.

  • Authentication in the real world: Moving from strategy to implementation

    Tip -  It's a common headache for security administrators. Management wants to roll out a strong authentication system across a heterogeneous IT environment. The biggest challenge is often effectively weaving an authentication plan into diverse directories,...