Page 72 - CDM-Cyber-Warnings-March-2014
P. 72
Some organizations have deployed biometric systems for authentication purposes, but these technologies have their own drawbacks, such as high-implementation costs and issues related to user privacy. And some organizations have implemented authentication solutions based on codes delivered by SMS text to cell phones, however, these solutions have limitations since not every user has a cell phone, and these solutions also depend on a reliable cell phone connection which is not always the case An Effective Authentication Alternative Software-based authentication solutions can address the concerns and challenges companies face and provide an alternative to hardware-based authentication products. Certain software- based solutions deliver the level of authentication that companies need today, and at a much lower cost than hardware tokens, smart cards, biometrics and other authentication offerings. Software based solutions utilize a combination of grids, images and patterns to convert static passwords/PINs into token-less one-time passwords/PINs (OTPs). These solutions are browser- based which enables users to securely log-in from any Internet browser enabled device (phones, tablets, wearables and computers), from any location, at any time. And because these solutions provide device-less OTPs, they offer a simple, more secure way to access information while leveraging users’ existing passwords and an organization’s password infrastructure. Software-based authentication solutions can be flexible and adaptable, and can enable companies to address multi-factor authentication and 2-factor authentication across a range of use cases. By implementing certain software-based solutions, organizations can eliminate hardware tokens and reduce the total cost of authentication, while at the same time ensuring they are protected against current and emerging security threats. Software-based authentication solutions can be applied to every access point, including VPNs, Web portals, cloud environments, mobile devices such as tablet computers, personal computers, storage devices, ATMs and other physical devices. Software-based authentication solutions can also be very easy to deploy, manage and use. Certain software-based solutions deploy as a virtual appliance and are scalable and can be configured to ensure high-availability. Plan of Action Information security is a high priority for businesses and having an effective authentication process is essential in today’s environment. Never before have so many users needed access to corporate networks and data from remote locations and never before have the security threats been greater. A username and static password alone are not enough to ensure secure access. " # % " $ " # ! !
   67   68   69   70   71   72   73   74   75   76   77