Alternative authentication: New authentication methods for enterprises

Alternative authentication: New authentication methods for enterprises

Alternative authentication: New authentication methods for enterprises

Date: Dec 04, 2012

For years, enterprise authentication has boiled down to one word: passwords. Yet the emergence of increasingly large rainbow tables for password cracking and frighteningly creative password theft via social engineering means organizations can no longer rely on password-based authentication alone.

In this special video presentation, SearchSecurity.com technical editor Randall Gamby discusses alternative and emerging authentication technologies for the enterprise. He reviews the pros and cons of two-factor, or multifactor, authentication and biometric authentication, plus introduces emerging concepts like heuristic authentication, host authentication and artificial intelligence. Later Gamby discusses the key factors in choosing the right authentication methods, and how to ensure an achievable outcome for an enterprise authentication implementation.

About the speaker:
Randall Gamby is the information security officer for the Medicaid Information Service Center of New York (MISCNY).

More on Two-Factor and Multifactor Authentication Strategies

  • canderson

    John Pescatore: Evasion techniques aiding advanced targeted attacks

    VIDEO - Video: SANS Institute's John Pescatore says though new evasion techniques are aiding advanced targeted attacks, defense matters as much as response.
  • canderson

    Get up to speed on FIDO Alliance efforts to secure online authentication

    VIDEO - In this webcast, expert David Strom reviews what FIDO Alliance efforts mean for online authentication methods.
  • canderson

    PayPal CISO hopes FIDO Alliance can help replace weak passwords

    VIDEO - Video: PayPal CISO Michael Barrett discusses the FIDO Alliance launch and how the open standard for online authentication might help replace weak passwords.
  • possession factor

    Definition - The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.
  • knowledge factor

    Definition - The knowledge factor, in a security context, is a category of authentication credentials consisting of information that the user possesses, such as a personal identification number (PIN), a user name, a password or the answer to a secret question.
  • user authentication

    Definition - User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input.
  • Multifactor authentication products: SafeNet Authentication Service

    Feature - Expert contributor David Strom takes readers through the ins and outs of this SaaS-based multifactor authentication solution for boosting login security.
  • Multifactor authentication products: SecureAuth IdP v8.0

    Feature - Expert David Strom looks at how Secure Auth IdP uniquely combines multifactor authentication and single sign-on login capabilities in a single product.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: