This resource is no longer available
Rainbow Technologies Authentication eBook
Understanding authentication/identity management should be the start of your company's security assessment. Threats to information security varies from one field or discipline to the next; a one size-fits-all answer often just isn't realistic. When you conduct a front-end evaluation of your own networks and business situation, you'll assess the kind of information you need to protect, and from whom you need to protect it.