How Companies Can Manage Strong Authentication Intelligently
by Mike Davies - VeriSign - Monday, 8 May 2006.
The security industry has recognised that the simple handling of strong authentication by users represents a significant reason for their acceptance and continued success in the market. While the smart card has so far been unable to assert itself as a carrier of digital certificates everywhere, the USB-compatible tokens are becoming increasingly popular.

But which ever technology path customer chose, as an industry we have to ensure we provide our customers with solutions to their problems. We know that one of their key problems is trying to mobilise workforces so our duty is to ensure that all organisations have secure access so they can continue to flourish in the 21st century. Now is the time for us all to act because stronger is most definitely better.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //