Understanding Versatile Authentication and Its Benefits

Date Added: Aug 2009
Format: PDF

For years organizations have relied primarily on username/ password mechanisms to control access to data, networks, and applications. However, increasingly complex business drivers, threats, and regulations necessitate a shift to stronger, more comprehensive identity and access management processes. Off late difficult economy and a rash of layoffs only exacerbate the need. According to a recent study by the Ponemon Institute, 59 percent of former employees admit to stealing confidential company information such as customer contact lists.