Home
 > search for

Featured Documents related to »  authentication mechanisms


Biometrics for Global Web Authentication: An Open Source Java/J2EE-Based Approach
Recently, companies have been working on integrating biometric verification capabilities using open source single-sign-on techniques. The main idea behind this

authentication mechanisms  provided by a Central Authentication Service (CAS) to offer single-sign-on Web authentication, while improving security beyond basic mechanisms based on login and password. Find out more. Read More...
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » authentication mechanisms


Great Product: Too Bad The Architecture Doesn’t Fit
During the process of product selection a great deal of attention is given to the functional capabilities of the software being evaluated. While this aspect is

authentication mechanisms  methodologies, archiving. Security User authentication and authorization, transaction and database security, directory services support. Tools Diagnostics, session control, print spooling. Performance Issues such as performance degradation when multiple application windows are opened on the same workstation, thread control between tiers of the application, network bandwidth and latency issues. Reporting Support for ad hoc reporting, third party integration, and custom report design. Support for Read More...
The Future of Secure Remote Password (SRP)
The Secure Remote Password (SRP) holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other

authentication mechanisms  The focus on strong authentication mechanisms came under scrutiny in the early 1990s with the Internet boom and the ever-growing need to authenticate people across insecure channels. Historically, when an application requires strong authentication, it has been believed that small passwords were insufficient and that a large password would prevent common dictionary attacks. Yet large random passwords have their own problem people fail to memorize them. More than likely, the user will need to write down Read More...
Bullet-proofing Instant Messaging
As more corporations adopt instant messaging (IM), chief information officers (CIOs) and IT managers are learning that it can be a serious source of liability

authentication mechanisms  passwords Use of multi-factor authentication Use of specific types of authentication services Compliance with the organization's acceptable use policy (AUP) for appropriate use of or reference to content, Web sites and IM activity Logging of all sensitive data access and transferºº Use of encryption Installation and use of consumer-grade IM software Where corporate solutions are available, users are typically forbidden to bypass corporate screening and filtering services when using IM on the job. Read More...
Secure Folder: File or Folder Encryption
Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual

authentication mechanisms  form of the certificate-based authentication is acknowledged to be highly secure, particularly if the key is stored on a smartcard. 2.6. Main components   2.6.1. Secure Folder (Safe Control) Safes are secure containers that help you to organize and protect files and directories. The safes (which may be located on a network drive or locally) can be used jointly by any number of users with the corresponding rights. With the Safe Control Application, administrators can create and manage safes, and add new Read More...
The Future of Secure Remote Password (SRP) Part Two: Overcoming Obstacles to Success
This article explores the possibilities for the Secure Remote Password (SRP) in today’s multi-channel world, specifically how it improves upon the inherent

authentication mechanisms  inherent insecurity of password authentication was discussed. It holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other password-based authentication schemes. Obstacles To Acceptance Smart Clients A smart' client is required to carry out the computations on the shared secret and to manage the handshake with the server. This requires software to be installed on the client machine. This has the biggest impact on the most prevalent Read More...
BioLink Technologies International
BioLink Technologies International, Inc., develops, manufactures, and markets fingerprint biometric products. The company's solutions form the core of biometric

authentication mechanisms  the core of biometric authentication solutions for logical access, which includes computers, networks, and Web-based resources; physical access; and large-scale civil identification and law enforcement applications. BioLink's suite of products use its proprietary fingerprint scanning, image processing, and one-to-many identification server technology. BioLink Technologies is based in Miramar, Florida (US). Read More...
Firewall RFI/RFP Template
Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies

authentication mechanisms  NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more Read More...
Raising the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication
The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the

authentication mechanisms  Data Protection and Strong Authentication The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Download this white paper now. Read More...
Ingeniux CMS
Ingeniux CMS is an enterprise Web content management platform. It is used for building Web sites, personalizing user experiences, delivering online marketing

authentication mechanisms  The application supports user authentication with single sign-on, collaborative workspaces, content approval with integrated workflow, Microsoft Sharepoint connections, and other features. Cartella integrates with Ingeniux CMS. Read More...
SECUDE International AG
SECUDE International AG is a market leader in the areas of authentication & authorization, encryption, data integrity and the management of digital identities

authentication mechanisms  in the areas of authentication & authorization, encryption, data integrity and the management of digital identities, delivering a higher level of IT Security to organizations around the world. The company offers solutions in single sign-on, role-based access control, and the security of documents, applications and transactions. Read More...
PKI and Biometrics Ready for Take-Off
Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same

authentication mechanisms  either PKI or Biometric authentication products that have the capabilities of capitalizing on the new electronic signature law with their cutting-edge technologies: Company Name PKI Vendors Biometric Vendors eEye YES Anonymous Data Corp YES Safety Latch YES Identix YES BioPassword YES Entrust YES Lexias YES PGP, Inc. YES Baltimore Technologies YES nCipher YES Verisign YES DataKey YES Marshall Software YES RSA Security YES In the biometric group, Identix's easy to install laptop versatile type II PCMCIA Read More...
RSA
RSA Security's portfolio of e-security solutions, which include authentication, Web access management and developer toolkits, help organizations to realize

authentication mechanisms  e-security solutions, which include authentication, Web access management and developer toolkits, help organizations to realize revenue opportunities and operational improvements of e-business while enhancing protection of critical information against unauthorized access and other forms of malicious intent. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others