Alternative authentication: New authentication methods for enterprises

Alternative authentication: New authentication methods for enterprises

Alternative authentication: New authentication methods for enterprises

Date: Dec 04, 2012

For years, enterprise authentication has boiled down to one word: passwords. Yet the emergence of increasingly large rainbow tables for password cracking and frighteningly creative password theft via social engineering means organizations can no longer rely on password-based authentication alone.

In this special video presentation, technical editor Randall Gamby discusses alternative and emerging authentication technologies for the enterprise. He reviews the pros and cons of two-factor, or multifactor, authentication and biometric authentication, plus introduces emerging concepts like heuristic authentication, host authentication and artificial intelligence. Later Gamby discusses the key factors in choosing the right authentication methods, and how to ensure an achievable outcome for an enterprise authentication implementation.

About the speaker:
Randall Gamby is the information security officer for the Medicaid Information Service Center of New York (MISCNY).

More on Two-Factor and Multifactor Authentication Strategies

  • canderson

    Will online authentication ever be free of passwords?

    VIDEO - Will online authentication ever be password-free? The webcast reviews the problems of online authentication and considers a passwordless future.
  • canderson

    John Pescatore: Evasion techniques aiding advanced targeted attacks

    VIDEO - Video: SANS Institute's John Pescatore says though new evasion techniques are aiding advanced targeted attacks, defense matters as much as response.
  • canderson

    Get up to speed on FIDO Alliance efforts to secure online authentication

    VIDEO - In this webcast, expert David Strom reviews what FIDO Alliance efforts mean for online authentication methods.
  • keystroke ID (keystroke identification)

    Definition - The use of an individual's distinctive typing dynamics can be used as a non-intrusive and reliable form of biometric authentication.
  • strong authentication

    Definition - Although it is not a standardized term, with set criteria, strong authentication can be said to be any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter.
  • Quiz: multifactor authentication

    Quiz - How well do you understand multifactor authentication and the authentication factors that support it? Take our quiz to find out.
  • Words to Go: Multifactor authentication

    Reference - Multifactor authentication is one approach to ensuring that only authorized users have access to resources. Our Words-To-Go glossary provides brief explanations to the essential MFA terminology, with links to our full definitions for more in-depth information.
  • How is Internet authentication changing?

    Quiz - You've reviewed the webcast, tip and podcast. So: Are you ready for the way Internet authentication practices will be changing? Take this quiz and see.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: