Improving security doesn't always mean having to buy more equipment or invest in expensive training
password - News, Features, and Slideshows
The Russian crime ring that amassed more than a billion stolen passwords has shown why businesses have no choice but to add other forms of authentication in securing access to websites and corporate networks.
Australia's third-largest retail institution confirmed this week that, from the first half of 2008, it would substantially upgrade its internet banking system for business customers, including small to medium businesses.
A key feature the bank is considering is so-called "two-factor" authentication, a system where customers are required to enter single-use passwords to log into their account or authorise transactions.
Whitepapers about password
This paper explores how enterprises can move beyond the password (something the user ‘knows’) to an intelligent authentication process that eliminates the risk of weak and vulnerable passwords. It works by cross-validating with other authentication methods like a physical item such as a token or smartphone (something the user ‘has’) and/or a personal attribute like a fingerprint or retina scan (something the user ‘is’). Two-factor (2FA) authentication and multifactor authentication (MFA) are now possible with intelligent authentication across corporate software, Cloud services and smart device apps.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.