This resource is no longer available

A Security Survey of Strong Authentication Technologies

Cover

Proof of authentication is easily manipulated – passwords are guessable, and a user’s history is easily discovered.

How can you enhance these security methods without inconveniencing users? In this resource, explore the pros and cons of the most common types of authentication methods and the classes of attacks used to impersonate authorized users. Click through to learn which type of solution – oftentimes multiple are required to get the job done – is best fit based on the threats you expect to be exposed to.

Vendor:
SafeNet, Inc.
Posted:
30 May 2014
Published:
21 Mar 2014
Format:
PDF
Length:
11 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.