The Buyer's Guide to Stronger Authentication
With the plethora of options and various price ranges, choosing a second form of authentication can be confusing.
View this webcast and learn more about:
- Getting what you pay for: examples of differences between products in the same product class
- Throwing money out the window: why identity assurance should be the primary goal of your stronger authentication deployment
- Getting stronger authentication deployments right
- And much more
Analyst, Identity and Privacy Strategies, Burton Group
Mark Diodati, CPA, CISA, CISSP, MCP, CISM, has more than 15 years of experience in the development and deployment of information security technologies. He has served as vice president of worldwide IAM for CA, as well as senior product manager for RSA Security's smart card, SSO, UNIX security, mobile PKI and file encryption products. He has had extensive experience implementing information security systems for the financial services industry since starting his career at Arthur Andersen & Co. He is a frequent at information security conferences, a contributor to numerous publications, and has been referenced in a number of academic and industry research publications.
- VeriSign, Inc
- May 16, 2007, 09:00 EDT (13:00 GMT)