Home
 > search for

Featured Documents related to » authentication mechanisms


Agile Information Systems: Conceptualization, Construction, and Management
Agile Information Systems: Conceptualization, Construction, and Management
The book "Agile Information Systems" unveils how modern companies can create and deploy agile information systems. Academic experts, researchers, and practitioners discuss the concept of agile information systems, the importance of the context of agility, and organizational management issues in the context of agile information systems.


Documents related to » authentication mechanisms


IronPort E-mail Authentication
Most spam, viruses, phishing, and e-mail denial-of-service attacks can be traced back to a single common cause: lack of e-mail protocol authentication. This lack of authentication means that a receiving mail server cannot reliably verify that a particular message is in fact from the sender it claims to be from, making it harder to distinguish friend from foe. Find out more about new standards that can help.

AUTHENTICATION MECHANISMS:
2/6/2008 4:04:00 PM

The Evolution of Strong Authentication
Strong authentication technologies have long been used to provide an extra layer of assurance that individuals accessing computing resources are who they say they are. However, the cost of deploying and managing such systems has made their use expensive and complex. New authentication models— and methods such as software, SMS, and BlackBerry tokens—are are taking the costs out of using strong authentication. Find out how.

AUTHENTICATION MECHANISMS:
2/25/2010 5:42:00 AM

Enterprise Authentication: Increasing Security without Breaking the Bank
As the number of remote and mobile workers grows, new security practices highlight the need for strong authentication. Today, passwords aren’t enough protection against unauthorized access. How can you increase authentication security while preserving operational and budget efficiency? Learn about the challenges of identity authentication, and the versatile solutions that can help prevent the risk of breaches and attacks.

AUTHENTICATION MECHANISMS:
5/23/2008 11:28:00 AM

Smart Card for Global Enterprise Authentication
Smart-card technology is an industry standard defined and controlled by the Joint Technical Committee 1 (JTC1) of the International Standards Organization (ISO) and the International Electronic Committee (IEC). Standards introduced in 1987 and updated in 2003 define attributes of a smart card—including physical characteristics, transmission protocols, security architecture, and common data elements. Find out more.

AUTHENTICATION MECHANISMS:
6/26/2010 9:09:00 PM

Stellent Universal Content Management


AUTHENTICATION MECHANISMS: Stellent Universal Content Management solutions allow users to deploy multiple line-of-business applications such as Web sites, call centers, dealer extranets, compliance initiatives, accounts payable, imaging, and claims processing. Universal Content Management features document and Web content management, and digital asset management and imaging. It is a scalable system that also delivers unstructured active and fixed content including documents, graphics, and Web pages, and scanned images, e-mails, and records.The company claims over 4,300 customers worldwide including Procter & Gamble, Merrill Lynch, Los Angeles County, The Home Depot, British Red Cross, ING, GlaxoSmithKline, Georgia Pacific, Bayer Corp., Coca-Cola FEMSA, Emerson Process Management and Genzyme Corp.

Collaborative Analytics: Sharing and Harvesting Analytic Insights Across the Business
Take advantage of expertise about Sharing and Harvesting Analytic Insights Across the Business.Download our free Whitepaper! Sadly, a division exists between business analysts and IT—they often perform separate data-related duties. There are benefits for companies that unite business analytics with business intelligence. But the adaptive information cycle—a model linking the center-out approach of traditional data warehousing to the emergent prototyping typifying today’s analytic environment—is not as complex as it may sound. Learn more.

AUTHENTICATION MECHANISMS:
7/9/2009 2:06:00 PM

Entrust


AUTHENTICATION MECHANISMS: Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises, and governments in 1,700 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include secure socket layer (SSL), authentication, fraud detection, shared data protection, and e-mail security. Entrust's first public-key infrastructure—the world's first commercially available PKI—was released in 1994. Now in its seventh edition, The Entrust Authority PKI product portfolio is now in its seventh edition.The company's worldwide headquarters is located in Addison, Texas (US), with offices in Australia, Canada, China, Germany, India, Japan, Argentina, and the United Kingdom (UK), as well as other locations in the US (Virginia and California).

Getting Back to Selling
Getting Sales Back to Selling. Find IT Solutions and Other Information Associated with the Sales Back. Faced with longer sales cycles, declining sales productivity, and increasingly discerning customers, companies are being forced to streamline and automate how sales information is processed, and change the mechanics of deal-making. Learn more about the strategies that best-in-class (BIC) companies are employing to improve sales effectiveness, boost productivity, and ultimately remain competitive.

AUTHENTICATION MECHANISMS:
9/25/2008 1:50:00 PM

Evolve Your SiteMinder Portal Security Without Breaking the Bank: How Virtualization Solves the Challenges of Heterogeneous Identity and Resource Integration
In a well integrated identity environment, SiteMinder handles web access management, authentication, single sign-on (SSO), secure session management, and flexible policy definition. SiteMinder functions well when data exists in a relatively homogeneous state; this blueprint shows users how to extend an existing SiteMinder infrastructure across additional heterogeneous applications, identity sources, and constituents.

AUTHENTICATION MECHANISMS: Access Control, Authorization, Identity Management, LDAP, Portals, ROI, Systems Integration, Systems Management, Virtualization Security.
3/21/2011 5:34:00 PM

The Future of Secure Remote Password (SRP)
The Secure Remote Password (SRP) holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other password-based authentication schemes. Yet the industry de-facto standard remains the password-based authentication scheme. This article explores the possibilities for SRP in today’s multi-channel world, specifically how it improves upon the inherent insecurity of password authentication and the obstacles to overcome to succeed.

AUTHENTICATION MECHANISMS:
3/3/2003

Protecting Exchange Environments from Spam
Spam has become a global epidemic. And because it is constantly evolving and mutating, spam makes it difficult to separate good e-mails from the bad. While most mail servers have mechanisms to combat spam, they often require third party solutions to eradicate spam from the network. Find out more about the shortcomings of established filtering methods, and how one community-based approach to filtering can work.

AUTHENTICATION MECHANISMS:
11/21/2007 3:47:00 AM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others