PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Where's the business smart card explosion?

This article is part of the Information Security magazine issue of March 2002
Imagine leaving for work in the morning, walking out of your house and down the street to the subway station. As you enter the station, you walk right past the line at the ticket counter and through the turnstile, which automatically deducts the fare from a smart card in your hip pocket. Twenty minutes later, you get off the subway and grab a cup of coffee, paying with the same smart card. Arriving at work, you whip the card out again for the lobby security guard, who glances at the photo and waves you through. Now at your office door, you use the smart card/ID badge as a key, waving it past an RF reader on the wall. Finally, as you sit down at your desk and boot up your PC, you slide the card -- the same card -- into a reader, enter your PIN and log on to the network. You've used your smart card five times, and it's not even 9 a.m. This scenario is the dream of every smart card manufacturer, issuer and integrator in the world. Put a smart card in everyone's hands, and build the infrastructure so it can be used everywhere, for ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Where's the business smart card explosion?
The U.S. has been slow to migrate to the smart card, which Europe and Asia have already adopted. Yet its functionality is becoming more practical and attractive to enterprises.
-
Top three benefits of smart cards
With a greater understanding of smart cards benefits, consumers are more likely to entertain the idea of using them and transition away from magnetic stripe cards.
-
Using digital rights management to protect data wherever it goes
Learn about the digital rights management technology Congressional Quarterly used to control electronic media distribution and lessen plagued deliveries.
-
Roundtable: How intelligence systems improve cyberattack response
Four of infosec's cutting-edge thinkers discuss how to analyze and understand intelligent systems, as well as the best cyberattack response and prevention.
-
How ISO 17799 certification helped St. Jude Medical formalize security
ISO 17799 certification provided a written security policy roadmap to St. Jude Medical, helping the company formalize IT security to fit its specific needs.
Columns in this issue
-
Themes from the 2002 RSA Security conference
The 2002 RSA security conference generated conversations about hot topics and new security trends, including 9/11, selling cycles, Web services and host-based security.
-
Trustworthy computing: Don't compromise security for convenience
While past actions may prove differently, Microsoft Chairman Bill Gates knows the key to trustworthy computing isn't just about finding and fixing bugs.
-
How to limit IDS false positives, gain measurable security
Learn how to limit IDS false positives and build a more secure enterprise by deploying network-based IDS and host-based IDS.
-
Spy-nux update: NSA SELinux draws interest from open source community
The NSA's Security Enhanced Linux (SELinux) uses best practices to keep systems secure. This framework, although complex, is reliable and flexible to changes in security.