Recent Posts In: SaaS
You heard about it, now what is it? Software as a service (SaaS) is changing the role of IT in the enterprise – including identity management. Here we’ll discuss the latest trends in trusted cloud computing and its application for identity management, physical access and Secure ID.
CEO Ayman Ashour is featured as the cover personality for February’s edition of “The Smart Sense.” Take a look at the interview as his leadership role in the greater identity market is highlighted. The SMART Sense: As the first Cover Personality for 2012 on The SMART Sense, what are your New Year resolutions and what does Identive, in its entirety, intend to achieve this year? Ayman: 2011 was an important year for Identive, a year of building our technology platform and towards the end of the year of consolidating our various product trade names under one...Read More Leave A Comment
Does Single Sign-On Alone Help With Security or Should it be Mandatory to Implement Stronger Authentication Along With it?
What are the considerations for doing them separately versus together? So, here is the issue. Say a person has 12 different user names and passwords to 12 unique applications which are unique in a corporate environment. The diversity makes them hard to remember, thus people tend write them down, making them even less secure. Now couple this with typical corporate password policies requiring employees to change their passwords every 30, 60 or 90 days, where they are encouraged to create passwords that are long, include various characters and do not...Read More Leave A Comment
For many years now, smart cards have proved their effectiveness as secure credentials for the IT environment. The chip on a smart card essentially is a microcomputer that is purpose-built to protect the security key that is unique on every card and which never leaves the card in any transaction. When used for IT security, a smart card can authenticate a user to a computer either at the OS level or pre-boot with disk encryption to the network, to applications, to perform email signing and encryption, and for other uses...Read More Leave A Comment