This resource is no longer available

The Buyer's Guide to Stronger Authentication

With the plethora of options and various price ranges, choosing a second form of authentication can be confusing.

View this webcast and learn more about:

  • Getting what you pay for: examples of differences between products in the same product class
  • Throwing money out the window: why identity assurance should be the primary goal of your stronger authentication deployment
  • Getting stronger authentication deployments right
  • And much more


Mark Diodati Analyst, Identity and Privacy Strategies, Burton Group Mark Diodati, CPA, CISA, CISSP, MCP, CISM, has more than 15 years of experience in the development and deployment of information security technologies. He has served as vice president of worldwide IAM for CA, as well as senior product manager for RSA Security's smart card, SSO, UNIX security, mobile PKI and file encryption products. He has had extensive experience implementing information security systems for the financial services industry since starting his career at Arthur Andersen & Co. He is a frequent at information security conferences, a contributor to numerous publications, and has been referenced in a number of academic and industry research publications.
VeriSign, Inc
May 16, 2007, 09:00 EDT (13:00 GMT)

This resource is no longer available.