For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.
David Strom |
03 Sep |
Read more
Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.
David Strom |
03 Sep |
Read more
Check Point wins test of eight unified threat management (UTM) devices for small business.
David Strom |
25 Jul |
Read more
Smartphones replace hardware tokens in latest generation of two-factor authentication schemes
David Strom |
29 May |
Read more
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.
David Strom |
20 May |
Read more
We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes.
David Strom |
17 Dec |
Read more
Business travelers will soon need to carry the name of their corporate lawyer in addition to their passport when traveling to the United States, and they may need to bring with them a different business laptop as well. This is because US Customs can search and confiscate your laptop without any prior cause, according to policies that have been posted online since a Ninth US Circuit Court ruling in April.
David Strom |
18 Sep |
Read more