Information Security Research Library

Powered by


Frequently, technologies and processes are at the center of our identity management considerations, while the user experience is at the edge. In this session, we investigate ways to improve the end user's experience, avoid deployment obstacles, and improve security. In addition, we will perform a maturity assessment of user-facing identity management technologies.

Topics include:

  • Authentication systems (smart cards, one-time password devices, and "Authenticator Best Practices")
  • Single sign-on techniques (enterprise SSO, Web access management, and federation)
  • Windows' capability to support stronger authentication
  • Consumer authentication techniques
  • Physical and logical integration


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.