Email Alerts
-
Exploring authentication methods: How to develop secure systems
Use this guide to discover authentication options and learn how to implement, maintain and secure several methods of authentication, such as biometrics, single sign-on (SSO) and smart cards to avoid security breaches and protect sensitive corporate a... Learning Guide
-
Enhanced Identity and Access Management
From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls. Session Downloads
-
Secure user authentication: Regulations, implementation and methods
When deploying any authentication option -- whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls -- businesses need to weigh several factors to decide which option best suits their needs. In this l... Identity and Access Manag
-
Authenticating Windows
Three options for Windows authentication with eSSO clients. Information Security maga
-
Identity and Access Management Services, Systems and Technologies
Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores criti... Security School
-
XML Web services tutorial: How to improve security in Web services
Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Learning Guide
-
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. Book Chapter
-
SAP Security Learning Guide
This guide pulls SAP security information from both SearchSecurity.com and its sister site, SearchSAP.com, to provide the most comprehensive resource around for all aspects of making your SAP system bulletproof. Learning Guide
-
Infosec Know IT All Trivia: Authentication
Test your knowledge of authentication methods with our Infosec Know IT All Trivia. Quiz
-
Sun launches open source OpenSSO for identity management
Sun integrates access management, federation and secure Web services in its new OpenSSO Enterprise Article | 30 Sep 2008
-
Startup Symplified delivers SSO in the cloud
Mid-sized enterprises lack the money and expertise to implement identity management for Web-based services. Startup Symplified is banking on the software-as-a-service (SaaS) model as a solution. Article | 26 Jun 2008
-
Kerberos security evolves for B2B, mobile tech
Kerberos is a dominant authentication protocol, embedded in Windows, Solaris and multiple Linux flavors. But with new threats and new technology, an upgrade is in order. Article | 02 Apr 2008
-
IBM acquires Encentuate for single sign-on software
In a move to bolster its identity and access management capabilities, IBM has announced its acquisition of Encentuate, Inc., a private company in Redwood City, Calif. Article | 12 Mar 2008
-
Security360: Identity management market
Analyst Mark Diodati describes the leaders of the identity management market; IBM's Joe Anthony explains Big Blue's strategy and Novell's Dale Olds on user-centric identity. Article | 08 Feb 2008
-
Top 10 access-related controls for PCI compliance
Companies that identify, monitor, report and investigate audit trails and conduct risk analytics are taking the right steps to protect critical data, according to one expert. Article | 10 Dec 2007
-
Flaws fixed in widely-used Kerberos program
MIT has fixed a pair of flaws in its widely-used Kerberos program attackers could exploit to cause a buffer overflow and run malware on targeted machines. Article | 05 Sep 2007
-
Oracle builds identity suite with Bharosa acquisition
Oracle's acquisition of Bharosa Inc. fills a key hole in Oracle's security lineup and could eventually pit it against EMC's RSA security division and IBM's Tivoli , according to experts. News | 20 Jul 2007
-
Integration migration
Today John Swainson, president and chief executive officer of CA, will be making his first keynote speech at an RSA conference. Since joining CA in 2004, John has focused the company on its core strengths of systems, network, security and storage man... Interview | 05 Feb 2007
-
Looking ahead to life without passwords
Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to stronger authentication. Article | 28 Jun 2006
- See more News on Enterprise Single Sign-On (SSO)
-
NSTIC identity plan: Can identity brokers stop Internet identity theft?
The new NSTIC identity proposal would have identity brokers handling enterprise merchant customer authentication. But can it work? Tip
-
Security on a budget: How to make the most of authentication tools
Working on an identity and access management project can be hard enough without having to worry about sufficient funding. In this tip, learn how to leverage existing identity and access management tools and software to keep your budget lean and your ... Tip
-
Kerberos configuration as an authentication system for single sign-on
Looking to implement single sign-on in your enterprise, but have a lot of custom applications that don't seem compatible? In this tip, IAM expert David Griffeth takes a look at Kerberos, a non-proprietary IAM tool, as a solution to network authentica... Tip
-
How to use single sign-on for Web access control to prevent malware
Web-based applications are popping up everywhere, and new worms and viruses are being developed just as quickly to exploit them. In this IAM expert tip, David Griffeth explains how to use single sign-on with multifactor authentication to keep malware... Tip
-
Enterprise single sign-on: Easing the authentication process
Learn how enterprise single sign-on (SSO) can ease the authentication process and can be a solution to employee access issues. Implementation and single sign-on software are also discussed. Tip
-
SSO: Strong authentication in enterprise deployments
By understanding the right amount of protection required, security pros can ensure SSO improves productivity, saves money and, most importantly, protects corporate information. Tip
-
2006 Products of the Year: Authentication
Information Security and SearchSecurity surveyed readers to identify the best authentication products of 2006. The winners are . . . Tip
-
2006 Products of the Year: Identity and access management
Information Security magazine and SearchSecurity.com asked readers to select the best identity and access management products of 2006. Readers selected from Web SSO, provisioning, directories and password management tools. Find out which products mad... Tip
-
Cheat sheet: Access management solutions and their pros and cons
A cheat sheet of the most common access solutions with a brief description, and their risks and pros and cons to help you choose the solution that is right for your organization. Tip
-
Layered access control: 6 top defenses that work
Security guru Joel Snyder introduces six strategies for building layered security in networks in this presentation from Information Security Decisions. Tip
- See more Tips on Enterprise Single Sign-On (SSO)
-
Types of SSO: Comparing two vendors' approaches to single sign-on
Expert Randall Gamby discusses various types of single sign-on, specifically the approaches of Ping Identity's SSO and Symplified SSO. AtE
-
SaaS access management: Finding the best single sign-on technology
Expert Randall Gamby details key strategies for SaaS access management and contemporary single sign-on technology that's truly interoperable. Answer
-
Detecting and blocking suspicious logins, unusual login activity in the enterprise
Randall Gamby dissects the delicate but crucial science of detecting and blocking suspicious logins and unusual login activity in the enterprise. Answer
-
Identity management SSO security: Hardening single sign-on systems
Get information on how to harden single sign-on systems for greater security in this response from IAM expert Randall Gamby. Ask the Expert
-
Password security vaults: Is SSO authentication better?
Password security vaults may be able to aid users in remembering many different passwords, but are they the most secure solutions? IAM expert Randall Gamby gives his recommendations on setting password technology policy. Ask the Expert
-
How to install a new router to prevent single sign-on problems
Are you receiving router pop-up messages telling you that it is "Unable to do single sign-on or federation"? In this expert response, learn what you need to do to get your router back on track. Ask the Expert
-
How to use single sign-on (SSO) for a server configuration
Using SSO for a server configuration can be done a few different ways. Learn more in this expert response from Randall Gamby. Ask the Expert
-
How to log in to multiple servers with federated single sign-on (SSO)
Single sign-on is a rapidly evolving technology that, when partnered with federation tools, can offer a greater and greater level of granularity for access control. Learn how from expert Randall Gamby. Ask the Expert
-
Learn about enterprise strategy for server virtualization single sign-on
Virtualization is a technology that's taking off, but how can information security professionals know how it will interact with their existing networks and applications? In this identity and access management expert response, learn how virtualizing a... Ask the Expert
-
User provisioning and SSO for PeopleSoft- and Unix-based products
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in this IAM expert response. Ask the Expert
- See more Expert Advice on Enterprise Single Sign-On (SSO)
-
single sign-on (SSO)
Single sign-on (SSO)is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. Definition
-
onboarding and offboarding
In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access pr... Definition
-
Types of SSO: Comparing two vendors' approaches to single sign-on
Expert Randall Gamby discusses various types of single sign-on, specifically the approaches of Ping Identity's SSO and Symplified SSO. AtE
-
NSTIC identity plan: Can identity brokers stop Internet identity theft?
The new NSTIC identity proposal would have identity brokers handling enterprise merchant customer authentication. But can it work? Tip
-
SaaS access management: Finding the best single sign-on technology
Expert Randall Gamby details key strategies for SaaS access management and contemporary single sign-on technology that's truly interoperable. Answer
-
Detecting and blocking suspicious logins, unusual login activity in the enterprise
Randall Gamby dissects the delicate but crucial science of detecting and blocking suspicious logins and unusual login activity in the enterprise. Answer
-
single sign-on (SSO)
Single sign-on (SSO)is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. Definition
-
Identity management SSO security: Hardening single sign-on systems
Get information on how to harden single sign-on systems for greater security in this response from IAM expert Randall Gamby. Ask the Expert
-
Password security vaults: Is SSO authentication better?
Password security vaults may be able to aid users in remembering many different passwords, but are they the most secure solutions? IAM expert Randall Gamby gives his recommendations on setting password technology policy. Ask the Expert
-
How to install a new router to prevent single sign-on problems
Are you receiving router pop-up messages telling you that it is "Unable to do single sign-on or federation"? In this expert response, learn what you need to do to get your router back on track. Ask the Expert
-
onboarding and offboarding
In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access pr... Definition
-
How to use single sign-on (SSO) for a server configuration
Using SSO for a server configuration can be done a few different ways. Learn more in this expert response from Randall Gamby. Ask the Expert
- See more All on Enterprise Single Sign-On (SSO)
About Enterprise Single Sign-On (SSO)
Enterprise single sign-on (SSO) technologies can help reduce help-desk calls and user mistakes by consolidating credentials into one single password for all applications and services. Read the news and technical advice here to find deployment strategies and practical advice.
Security Management Strategies for the CIO