Information Security Research Library

Powered by Bitpipe.com

ABSTRACT:

This session shows you how the proper classification of data is key to choosing the appropriate level of authentication before profiling various forms of authentication - hardware and software tokens, multiple passwords, smart cards, certificates and biometrics - with an eye toward cost, ease of implementation and security. You also learn how authentication plays into an effective compliance program, understanding the prescriptive steps to take to meet regulatory demands. Attend this session and return to the office with:

  • A clear understanding of how data classification determines authentication requirements
  • An overview of strong authentication mechanisms
  • Insights on how to pick the right authentication solution
  • Advice on how authentication helps meet compliance and regulatory demands

(THIS RESOURCE IS NO LONGER AVAILABLE.)

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.