Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

New authentication technologies can help boost online success

What authentication technologies make logging in both simple and secure, for customers and companies? This podcast explores authentication techniques that can boost sales and security.

FROM THE SECURITY SCHOOL:

Game-changing enterprise authentication technologies and standards

SECURITY SCHOOL SECTIONS

  1. Authentication
+ Show More

A time-consuming or frustrating login process can undermine potential online sales, though a process that is easy but not secure will hurt companies' bottom line. Enterprises need to feel confident in customer payment credentials; customers need to be able to buy online with the least amount of frustration.

The entire customer password process too often turns out to be too frustrating and too insecure, and security pros are working now to replace the system. Tune in to this podcast to learn which new authentication technologies will make logging in both simple and secure.

So say goodbye to passwords and prepare yourself now for the coming (and we mean imminent) revolution in online authentication.

About the speaker:
Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He has a passion for making IT security best practices easier to understand and achievable. His website http://www.hairyitdog.com/ offers free security posters to raise employee awareness of the importance of safeguarding company and client data and of following good practices.

Next Steps

Watch this video about the FIDO Alliance and its efforts to secure online authentication.

Learn about the KeePass password management tool in this screencast

What's new in cloud-based identity and access management?

This was last published in January 2015

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

Game-changing enterprise authentication technologies and standards

SECURITY SCHOOL SECTIONS

  1. Authentication

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

It is necessary to have a safe and secure authentication system for both customers and company for reducing frustration and time as well. At that time helping with such an amazing podcast is really appreciable which can help in some manner.
Thanks
Ijact.in
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close