Alternative authentication: New authentication methods for enterprises

Alternative authentication: New authentication methods for enterprises

Date: Dec 04, 2012

For years, enterprise authentication has boiled down to one word: passwords. Yet the emergence of increasingly large rainbow tables for password cracking and frighteningly creative password theft via social engineering means organizations can no longer rely on password-based authentication alone.

In this special video presentation, SearchSecurity.com technical editor Randall Gamby discusses alternative and emerging authentication technologies for the enterprise. He reviews the pros and cons of two-factor, or multifactor, authentication and biometric authentication, plus introduces emerging concepts like heuristic authentication, host authentication and artificial intelligence. Later Gamby discusses the key factors in choosing the right authentication methods, and how to ensure an achievable outcome for an enterprise authentication implementation.

About the speaker:
Randall Gamby is the information security officer for the Medicaid Information Service Center of New York (MISCNY).

More on Two-Factor and Multifactor Authentication Strategies

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: