But since the emergence of connected computing, networks have proliferated, and attempted theft or destruction of data too. Today authentication means no longer meets our requirements in terms of sécurité.N 'any' amateur pirate "passionate technology would be able to find your password using software available for download Internet and, in less than a day. More simply, what employee can deny having already written passwords (often numerous and hard to remember) on a piece of paper lying around on the desk or on the edge of the screen?
The diversity of applications, the need for secure access, necessarily grow CIOs always use more passwords and access constraints. But then ... with security policies that impose change your password every three months, and the number of targeted applications, employees often feel helpless or overwhelmed.
Yet, thank goodness, there are simple solutions to secure access to the SI, counter the attacks of the day, and without multiplying passwords!
The solution is strong two-factor authenticationStrong authentication is to use a support (smart card, USB, Smartphone ...) that the user always has on him, in addition to their username / password or better, its client certificate.
This authentication method is becoming the norm in the business world, more and more IT departments want to secure their network, with simple techniques and ensuring the integrity of their information systems. It is also possible to facilitate the deployment of certificates through a tool CMS (card management system), which manages the park authenticators and generate certificates in Self-Service.
It is not uncommon to see an employee with a smart card (or other), and it must present to log work on his PC. The PIN code of the card is needed to unlock the extension.
More generally, the trend is towards the use of smartphones (BYOD COPE) as a means of authentication. Compatible with iOS and android application, the user will also be able to authenticate the mobile device, and generate a session token directly on their smartphone (via the authentication mechanism chosen).
To counter the many passwords to remember, it is also possible to implement a system of SSO (Single Sign On), which will propagate and manage the user passwords its different applications: "I m identifies it once, and authentication for all applications that I use will be done automatically. " This is a gain in safety, productivity and real comfort for the user.
Finally, note that if you still want more security, it is possible with strong three-factor authentication!This is the use of an item that the user has (smart card, smartphone, ...) protected by a PIN code (that I know), and using biometrics (which I am).
This authentication method is very popular with customers in the banking sector, since it guarantees the highest level of security simple to implement to date, and helps secure sensitive applications, commonly used in the industry .
The diversity of applications, the need for secure access, necessarily grow CIOs always use more passwords and access constraints. But then ... with security policies that impose change your password every three months, and the number of targeted applications, employees often feel helpless or overwhelmed.
Yet, thank goodness, there are simple solutions to secure access to the SI, counter the attacks of the day, and without multiplying passwords!
The solution is strong two-factor authenticationStrong authentication is to use a support (smart card, USB, Smartphone ...) that the user always has on him, in addition to their username / password or better, its client certificate.
This authentication method is becoming the norm in the business world, more and more IT departments want to secure their network, with simple techniques and ensuring the integrity of their information systems. It is also possible to facilitate the deployment of certificates through a tool CMS (card management system), which manages the park authenticators and generate certificates in Self-Service.
It is not uncommon to see an employee with a smart card (or other), and it must present to log work on his PC. The PIN code of the card is needed to unlock the extension.
More generally, the trend is towards the use of smartphones (BYOD COPE) as a means of authentication. Compatible with iOS and android application, the user will also be able to authenticate the mobile device, and generate a session token directly on their smartphone (via the authentication mechanism chosen).
To counter the many passwords to remember, it is also possible to implement a system of SSO (Single Sign On), which will propagate and manage the user passwords its different applications: "I m identifies it once, and authentication for all applications that I use will be done automatically. " This is a gain in safety, productivity and real comfort for the user.
Finally, note that if you still want more security, it is possible with strong three-factor authentication!This is the use of an item that the user has (smart card, smartphone, ...) protected by a PIN code (that I know), and using biometrics (which I am).
This authentication method is very popular with customers in the banking sector, since it guarantees the highest level of security simple to implement to date, and helps secure sensitive applications, commonly used in the industry .
0 comments:
Post a Comment