Authored on: Oct 16, 2013
For law enforcement agencies, timely information sharing is critical for stopping and reducing crime. Criminal Justice Information (CJI) is shared at all levels starting at the federal level through state and even municipal local agencies. With the crucial need to share CJI comes the need to protect this sensitive information, the leakage of which can affect the effectiveness of ongoing crime fighting operations.
The Criminal Justice Information Services (CJIS) Security Policy defines the requirements of timely availability of shared information on one hand and data confidentiality on the other. This security policy contains a set of controls, requirements, and best practices, and it must be adhered to by any organization that exchanges criminal records.
One of the most demanding requirements in the CJIS Security Policy is the requirement for advanced authentication mechanisms. As of September 30, 2014, law enforcement agencies that do not employ an advanced authentication solution will not be able to access the FBI's CJIS information network.
But, advanced authentication is not clearly defined in the CJIS security policy. So, what exactly does advanced authentication mean? Furthermore, how do you comply with a mandate that has no clear guidelines?
Download this white paper to learn how to choose the right CJIS-compliant authentication method that best fits your organization?s needs:
� Benefits and drawbacks of hardware-based, software-based, out-of-band, and pattern matching solutions
� Top decision factors to examine when choosing an advanced authentication solution
� User experience considerations
� Path for growth