sponsored by Safestone Technologies
Posted:  27 Oct 2010
Published:  27 Oct 2010
Format:  PDF
Length:  7  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

The pressure to demonstrate compliance with standards and regulations such as Sarbanes Oxley, HIPAA, PCI DSS and Basel II, coupled with the increased value placed on the information created and stored, means organizations are faced with the challenge of securely controlling access to sensitive data. Ever changing user requirements inside the firewall and the need for employees, partners, suppliers, etc. to have access to data outside the firewall; only increase the complexity of securely managing user access.

The traditional access control method of user IDs and passwords can no longer be considered the most secure option. Read on to learn about Two Factor Authentication, a technology which helps organizations meet compliance standards and improve the existing security environment, and how it works on theĀ on the System i server.






BROWSE RELATED RESOURCES
Authentication | Authorization | Compliance Best Practices | Data Security | Password Management | Security Management | System i

View All Resources sponsored by Safestone Technologies

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement