From tokens to biometrics, there are many solutions to beef up user authentication. Value-added resellers (VARs) and systems integrators are in a position to help their customers carefully evaluate the choices. This article, reposted courtesy of Information Security magazine, introduces the technologies that can be used to create a two-factor authentication system.
Christopher Paidhrin had no difficulty selling an enterprise single sign-on and fingerprint authentication solution to upper management at Southwest Washington Medical Center. Quite simply, it took out the hassle factor of HIPAA compliance.
"By implementing this solution we addressed eight principal requirements and 15 secondary requirements," says Paidhrin, senior security officer for ACS Healthcare Solutions, the IT outsourcing partner to the the hospital.
Regulatory requirements, like HIPAA and new regulations such as Federal Financial Institutions Examination Council (FFIEC) rules, are forcing organizations to scramble for authentication and identity management options. Meanwhile, the Homeland Security Presidential Directive 12 (HSPD 12) mandates that federal1 agencies must have a single ID card for physical and IT access by Oct. 27.
Because of these new and existing regulations, Information Security magazine and SearchSecurity.com readers rank strengthening authentication as their top ID and access management priority for this year.
In general, organizations should consider which regulations impact them and conduct a risk analysis of their systems. From there, they can decide the most appropriate way to apply strong authentication so that they're protecting systems with sensitive data and meeting regulatory requirements without going overboard.
Tokens, smart cards, biometrics and certificates all offer stronger ways of identifying users, customers and partners. Each has its strengths and weaknesses, and costs can be anywhere from $1 to $35 per user. As a result, companies must weigh their costs with the benefits and understand that each solution doesn't necessarily provide sure-fire security.
Learn more about each of these authentication options by clicking on the links below.
About the author
Tom Bowers is the Security Director of Net4NZIX, an independent think tank and industry analyst group, as well as a technical editor for Information Security magazine. Bowers, who holds the CISSP, PMP and Certified Ethical Hacker certifications, is a well known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. He is also the president of the Philadelphia chapter of Infragard, the second largest chapter in the country with more than 600 members.
Dig deeper on Identity management and access controls