CrossNodes Product Briefing: Authentication
Unfortunately, network and enterprise security is more important that any of us have dreamed possible. The very real threat of electronic terrorism bringing down global economies by reeking havoc with the world's financial and business institutions is real.
For IT management, security is suddenly at the very top of every priority list. Where guarding against Web-based worms and viruses were a constant priority; suddenly every network and web user is suspect. Knowing who's on your networks and Web sites is now critical.
CrossNodes Briefing on Authentication will give you a basic overview of the technology. The Product Briefing listing accompanying this article will help you narrow down product availability or provide additional alternatives for more robust authentication solutions.
Though instantaneous authentication help is available, there is much more to the authentication market and will be in the days to come.
In one week alone, Wall Street proved that data security, and authentication in particular, is now vital as investors injected millions into security technology companies. Many of those same companies are rapidly acquiring smaller security technology firms. The major player infighting, however, has gotten louder and stronger in the past few weeks.
There are two issues that authentication vendors have to settle --
- Where the line gets drawn between a totally anamous Internet that users want and the right to know users that companies wants and law enforcement needs
- Global authentication standards
Sun and friends "Liberty Alliance" was formed to manage authentication and identity in offline businesses and the Web while competing with Microsoft 's Passport Services and .Net. "Liberty Alliance" as envisioned is an "federated" authentication service where users will register once and all companies, in the "federation" can share identifying information. Though that portion is similar to Passport, Passport is an authentication technology; Liberty is a set of interfaces that allow existing authentication implementations to share information.
Whichever the de facto standard is ultimately based on, it will probably err on the side of caution rather than user privacy.
Vendor: ActivCard Product: ActivCard Gold OS(s): Win 95, 98, 2000, ME, NT www.activcard.com/activ/products/end_user/activ_card_gold/index.html Vendor: Aladdin Knowledge Systems Product: eToken Product Family OS(s): Win 98, 2000, NT www.ealaddin.com/etoken/default.asp?cf=tl Vendor: BioNetrix Product: BioNetrix Authentication Suite www.bionetrix.com/html/products.htm#BioNetrix%20Authentication%20Suite%204.1 Vendor: CRYPTOCard Product: CRYPTOAdmin OS(s): Win NT, 2000, Solaris, Linux www.cryptocard.com/index.cfm?CID=4&NAVCID=4&PageName=Products Vendor: Funk Software Product: Steel-Belted Radius OS(s): Win NT; Novell; Solaris www.funk.com/radius/enterprise/ent_solns.asp Vendor: G-Lock Software Product: Activity and Authentication Analyzer (AAAnalyzer) OS(s): Win 98, 2000, ME, NT www.glocksoft.com/aaanalyzer/index.htm Vendor: Netegrity Product: SiteMinder OS(s): Win NT; HP-UX; IBM-AIX; Linux; Solaris www.netegrity.com/products/index.cfm?leveltwo=SiteMinder Vendor: RSA Security Product: SecurID OS(s): Win NT; Novell; Unix www.rsasecurity.com/products/securid/index.html Vendor: Secure Computing Product: SafeWord Product Family OS(s): Win 2000, NT; HP-UX; Linux; Solaris www.securecomputing.com/index.cfm?sKey=643 Vendor: Symantec Corp. Product: Defender OS(s): Win 95, 98, 2000, ME, NT; Solaris enterprisesecurity.symantec.com/products/products.cfm?ProductID=51&PID=5897010