A More Secure Front Door: SSO and Strong Authentication
sponsored by Imprivata

Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.

Not anymore. Today, companies of all types and sizes are deploying Strong Authentication inside the corporate firewall, enterprise-wide -- even within applications. Most regulatory bodies are mandating it, and an increasing number of organizations consider it an essential part of data security best practices. A recent report by the Commission on Cyber security for the 44th President recommends it for the government and consumer companies. As the global economic downturn results in unprecedented workforce reductions, the security risk of insider security breaches has never been greater. At the same time, Strong Authentication technologies have become more practical, affordable, easy, and flexible to implement.

For all of these reasons, there’s never been a better time to take advantage of the increased data security of Strong Authentication. But what form(s) of Strong Authentication are best for you and your organization? What factors should you consider as you evaluate Strong Authentication? What capabilities do you require? What are the opportunities, issues, and trade-offs you can expect? Imprivata has published this white paper to help answer these and other key questions.

Available Resources from Imprivata
See what other users are reading via our Daily Top 50 Report

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement