2006 Products of the Year: Authentication

RSA Security, www.rsasecurity.com

With the threat of data theft and the demands of regulatory compliance, enterprises are clamoring for tools to ensure users accessing the network are indeed who they say they are.

Patrick A. CotÉ, information security officer for Houghton Mifflin Company, says RSA Security's RSA SecurID has proven itself as the best fit for his company. Others have reached the same conclusion, making it this year's gold-medal winner in authentication for the second straight year.

"With our prior system, you could really try to guess passwords," CotÉ says. "The whole password schema really wasn't very robust, so we looked for a two-factor authentication product."

His department rolled out SecurID tokens in May 2005; by late December, 2,500 accounts had been established in a Unix environment. So far, he says, "not a single person has had trouble authenticating."

The tokens are used strictly for remote access. "Once the PIN is set up, if the token is used correctly there's no downtime," CotÉ says. "It's very reliable. That was really why we chose RSA over the others. We needed that reliability."

    Requires Free Membership to View

More information on authentication

Find out who won our previous authentication Products of the Year.

Learn about the various forms of authentication with our Learning Guide.

Visit our resource center for news, tips and expert advice on authentication.

Check out the rest of our 2006 Product of the Year winners.


Users responding to the Products of the Year survey rate SecurID particularly high in the performance, vendor support/service, features and overall quality categories. One user SecurID calls it "the standard by which all others are judged." Another calls it a "first-rate and robust product." Others agreed with CotÉ that it is "very reliable."

Since 1986, SecurID has defined authentication, authorization and accounting, and still the SecurID system offers the application support, management/deployment capabilities, and a reputation for reliability and technical support that give it real-world utility in every type of enterprise.

While CotÉ has deployed it in a Unix environment, organizations can also deploy SecurID through a variety of hardware and software tokens for Windows workstations and assorted handheld devices and wireless phones.

SecurID's scalability is another critical factor, enabling large enterprises to deploy and manage authentication for millions of users and hundreds of apps through its Authentication and Deployment managers. The bundled Deployment Manager is automated, Web-based provisioning software that enables quick token deployment. Its self-service capability reduces the drain on IT staffs and help desks.

For SMBs, two-factor authentication is also available with the RSA SecurID Appliance, a hardened Windows box with embedded firewall functionality designed for easy management.

Steel-Belted Radius/Enterprise Edition
Funk Software (Juniper Networks), www.funk.com

Authentication is where the rubber hits the road, and this RADIUS/AAA server for wired and wireless networks helps keep enterprises running smoothly and securely.

VeriSign Managed PKI Services
Verisign, www.verisign.com

Trust is a cornerstone of security, and companies trust VeriSign, which won very strong survey approval for security, and good ratings for performance and overall quality for its range of PKI services.

This was first published in February 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.