From Password Reset to Authentication Management
|| Jun 09, 2011
|| 31 pages
This document describes the technological evolution and highlights the product capabilities that organizations should consider in order to have a lasting value from their investment.
In part, this document questions the benefits of investing in point solutions with limited functionality and expansion capabilities and in favor of investing in a platform capable of addressing both short- and long-term needs.
In the Beginning: A Simple Problem
Proliferation of Passwords
Locked-out Users, Mobile Users and Cached Passwords
Multi-Factor Authentication: Smart Cards and Tokens
Public Key Infrastructure and Encrypted Key Files
Full Disk Encryption
User Enrollment and Adoption
Privileged Accounts and Passwords
Tags : password reset, authentication management, proliferation of passwords, locked-out users, mobile users and cached passwords, full disk encryption, user enrollment and adoption, privileged accounts and passwords, technology