Results tagged "authentication"
Total Search Results : 67
December 11, 2012 09:33 AMSmartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.
March 22, 2012 09:00 AMSecurity has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures.
February 27, 2012 04:40 PMIf the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.
February 21, 2012 09:00 AMGone are the days of simply providing good signal in the WLAN environment. Guest requirements, the new reality of the BYOD--or bring your own device--model and increasing reliance on the wireless network as a critical resource combine to make life complicated for us in the business of enterprise wireless networking. Aruba Networks is ready to answer the back-end challenges of contemporary wireless with its new ClearPass framework, and the impressive array of features is not limited to use by Aruba customers.
June 16, 2011 11:47 AMWhen the topic of high-quality wireless networking comes up, its trendy to bandy about notions of blazing throughput and Star Trek-sounding features like "beam forming" and "band steering." But before a client gets to benefit from the growing magic built into the contemporary wireless network, it probably needs to be scrutinized under the lens of “triple A”: authentication, authorization and accounting. This is where the often unsung hero called RADIUS comes in.
June 09, 2011 01:30 PMA free new tool from security vendor SecureState may make it possible for wireless network administrators and security consultants to verify how strong their wireless authentication is and whether it is possible for attackers to easily penetrate their networks. EAPeak is a simple Python toolkit that will monitor access attempts to a wireless network and track how clients are attempting to authenticate.
March 15, 2011 10:30 AMAuditors generally take a dim view of the data security programs at organizations that they audit, according to a Ponemon Institute survey sponsored by Thales eSecurity. Only about one-third of the respondents said that the organizations are proactive in managing privacy and data protection risks. Further, three of five say they don't feel data security is a strategic priority. Fewer than half believe these organizations have sufficient resources to meet their data compliance requirements. The net outcome is that half the audits they conduct reveal serious deficiencies or compliance failures.
February 11, 2011 10:15 AMTufin Technologies has extended its firewall audit and change management capabilities to "next generation" firewalls with support for Palo Alto Networks products. In addition to standard network-based firewall capabilities, Palo Alto enables organizations to create fine-grained policies and rules based on application and user identity using deep packet inspection (DPI) technology.
January 27, 2011 10:30 AMRSA has announced Authentication Manager Express (AMX), a strong remote access authentication appliance for small and midsize businesses. AMX is designed as a simplified SMB alternative to RSA Authentication Manager, the enterprise-class software behind SecurID.
January 20, 2011 04:29 PMSymantec has announced the integration of VeriSign authentication products into Protection Center, its platform for unified management, intelligence and automation of Symantec and third-party partner security tools. The announcement means that users will be able to manage VeriSign Managed PKI, VeriSign Managed PKI for SSL and VeriSign Identity Protection (VIP) Authentication Service from a single console.
Best of the Web
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Get a primer on the Openflow protocol and what it can do for networking.