Unfortunately, network and enterprise security is more important that any of us have dreamed possible. The very real threat of electronic terrorism bringing down global economies by wreaking havoc with the world’s financial and business institutions is real.
For IT management, security is suddenly at the very top of every priority list. Where guarding against Web-based worms and viruses were a constant priority; suddenly every network and web user is suspect. Knowing who’s on your networks and Web sites is now critical.
CrossNodes Technology Briefing on Authentication will give you a basic overview of the technology. This Product Briefing will help you narrow down product availability or provide additional alternatives for more robust authentication solutions.
Though instantaneous authentication help is available, there is much more to the authentication market and will be in the days to come.
|Additional Resources on CIN|
Each Technology Briefing acts as a reference on individual technologies and products,
providing a knowledge base and guide to IT decision-makers in purchasing and deployment.
here to reach a collection of previous Technology Briefings. Topics include: Firewalls, WLANs, network
storage and others.
You can also go to the Great Docs section
to find these Technology Briefings and other informative resources and documents on training and
staffing, e-mail and
Internet usage policies, a guide to project
management and other topics.
In one week alone, Wall Street proved that data security, and authentication in particular, is now vital as investors injected millions into security technology companies. Many of those same companies are rapidly acquiring smaller security technology firms. The major player infighting, however, has gotten louder and stronger in the past few weeks.
There are two issues that authentication vendors have to settle —
- Where the line gets drawn between a totally anamous Internet that users want and the right to know users that companies wants and law enforcement needs
- Global authentication standards
It should come as no surprise that Microsoft’s read on these issues are very different from Sun Microsystems. So much so that Sun and thirty-two of its closest friends have rapidly formed an Alliance around these issues. As of September 11, the luxury of fighting out the future of Internet-based E-commerce, as well as the security of internal networks and data disappeared.
Sun and friends “Liberty Alliance” was formed to manage authentication and identity in offline businesses and the Web while competing with Microsoft ‘s Passport Services and .Net. “Liberty Alliance” as envisioned is an “federated” authentication service where users will register once and all companies, in the “federation” can share identifying information. Though that portion is similar to Passport, Passport is an authentication technology; Liberty is a set of interfaces that allow existing authentication implementations to share information.
Whichever the de facto standard is ultimately based on, it will probably err on the side of caution rather than user privacy.
Vendor: ActivCard Product: ActivCard Gold OS(s): Win 95, 98, 2000, ME, NT www.activcard.com/activ/products/end_user/activ_card_gold/index.html Vendor: Aladdin Knowledge Systems Product: eToken Product Family OS(s): Win 98, 2000, NT www.ealaddin.com/etoken/default.asp?cf=tl Vendor: BioNetrix Product: BioNetrix Authentication Suite www.bionetrix.com/html/products.htm#BioNetrix%20Authentication%20Suite%204.1 Vendor: CRYPTOCard Product: CRYPTOAdmin OS(s): Win NT www.cryptocard.com/index.cfm?CID=4&NAVCID=4&PageName=Products Vendor: Funk Software Product: Steel-Belted Radius OS(s): Win NT; Novell; Solaris www.funk.com/radius/enterprise/ent_solns.asp Vendor: G-Lock Software Product: Activity and Authentication Analyzer (AAAnalyzer) OS(s): Win 98, 2000, ME, NT www.glocksoft.com/aaanalyzer/index.htm Vendor: Netegrity Product: SiteMinder OS(s): Win NT; HP-UX; IBM-AIX; Linux; Solaris www.netegrity.com/products/index.cfm?leveltwo=SiteMinder Vendor: RSA Security Product: SecurID OS(s): Win NT; Novell; Unix www.rsasecurity.com/products/securid/index.html Vendor: Secure Computing Product: SafeWord Product Family OS(s): Win 2000, NT; HP-UX; Linux; Solaris www.securecomputing.com/index.cfm?sKey=643 Vendor: Symantec Corp. Product: Defender OS(s): Win 95, 98, 2000, ME, NT; Solaris enterprisesecurity.symantec.com/products/products.cfm?ProductID=51&PID=5897010
This briefing originally appeared on internet.com’s Crossnodes.com