authentication

Review: SecuriKey Personal Edition

Review: SecuriKey Personal Edition

The SecuriKey Personal Edition is a single-user solution providing secure access to your workstation.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: SecuriKey Authentication System Professional Version

Review: SecuriKey Authentication System Professional Version

The SecuriKey Authentication System (Professional Version 1.2) is a straightforward product which supplements a conventional password with a USB token key to provide two-factor authentication.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Digipass

Review: Digipass

The Digipass pack product from Vasco is perhaps less of a product in the accepted sense and more of a security philosophy – the philosophy in question being that of dynamic, one-time password creation using portable tokens.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: ECHOsystem

Review: ECHOsystem

The ECHOsystem from Fizians Inc. is certainly different. It uses audio to transmit the equivalent of a dynamic password across the network for user authentication purposes.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Entrust USB Token

Review: Entrust USB Token

Entrust is known for its expertise in managing and securing digital identities, and the Entrust USB token is a two-factor authentication product worthy of the company's reputation. The token is based upon the Rainbow Technologies iKey 2032 device, a proven product.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: iKey 1000

Review: iKey 1000

The iKey product from Rainbow Technologies comes in a variety of ways, according to your individual requirements. The iKey 1000 tested is a straightforward two-factor authentication product featuring a USB token and PIN.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: iKey 2000

Review: iKey 2000

The iKey 2000 product from Rainbow Technologies is similar in concept to the iKey 1000, but it offers additional functionality, including 2048-bit encryption and a Philips 5032 cryptographic controller.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: KeyCrypt

Review: KeyCrypt

The DigiSafe USB token seems just like any other at first glance, but it gradually reveals itself to be an exceptionally interesting device.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Novell Netware 6.5

Review: Novell Netware 6.5

You might find it strange to see Novell Netware (essentially a network operating system) included in a group test of two-factor authentication products. But we are discussing secure access to information and services from both local and remote access points. We are also discussing effectively managing user profiles and administering security policies accordingly.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Passholder Pro

Review: Passholder Pro

This USB token offers two-factor authentication that has been considered from many perspectives, including that of the user.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: U.are.U Pro for Active Directory

Review: U.are.U Pro for Active Directory

We've reviewed this product before, (albeit a slightly earlier software revision), but make no apologies for including it as a solid two-factor authentication solution.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Vintela Authentication from SCO

Review: Vintela Authentication from SCO

Not strictly a single sign-on (SSO) product,Vintela Authentication is designed to provide a more cost-effective solution than SSOs to the problem of users having different login credentials to Windows and UNIX resources.

Geoff Marshall Feb 1 2004 12:00AM Security
Authentication - Was That Really You Who Just Logged In?

Authentication - Was That Really You Who Just Logged In?

For this month’s article, I felt a need to address one of my most frequent concerns - authentication.
Jack Wiles Jan 16 2004 1:08PM Security
Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Anton Chuvakin Jan 16 2004 11:01AM Security
Taking a Realistic Approach to Remote Authentication

Taking a Realistic Approach to Remote Authentication

Just under a decade ago, I was asked to write a white paper on the future of telecommunications and networking for a major telecom company who shall remain nameless.
Steve Gold Jan 16 2004 9:53AM Security
Fingerprint Authentication: Shifting the Electronic Security Paradigm

Fingerprint Authentication: Shifting the Electronic Security Paradigm

Interest in security is at an all-time high. How can we best secure our possessions, our information, even ourselves?
S. K. Jan 14 2004 2:36PM Security
Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Organizations are increasingly being asked to provide staff with remote access to corporate systems.
Ken Douglas Jan 12 2004 12:25PM Security
Review: Authenex Strong Authentication System

Review: Authenex Strong Authentication System

Authenex Strong Authentication System (ASAS) is described as a network security application that provides strong (two-factor) authentication for remote, VPN and web access. This would appear to sum things up quite well and Authenex provides a variety of software tools to support this goal.

Julian Ashbourn Apr 1 2003 12:00AM Security

Log In

  |  Forgot your password?