Current security issues caused by an increasing number of threats, application vulnerabilities and the growing complexity of many computing environments is making traditional approaches to system maintenance and support very difficult to manage. Exacerbating the problem of endpoint management are the user demands for freedom to install their favorite productivity applications or use the latest handheld Personal Data Assistant (PDA). In this paper, the author examines the challenges facing managers as they attempt to provide secure, continuous processing capabilities on ones endpoint devices, specifically large clients.
Biometrics is one of the solutions advertised by security vendors to meet multifactor authentication objectives. However, user acceptance and cost issues often avert organizations from adopting biometrics as an answer. The capital expenses and on-going maintenance costs of token-based systems are often higher than those for biometrics. Solutions based on keystroke dynamics might help meet these business challenges. This white paper overviews at biometrics in general that includes success factors for implementation and user acceptance. This white paper also takes a look at how the effectiveness of biometric solutions is measured.
Data in transit or at rest is the primary focus of administrative, physical and technical safeguards. Security professionals are doing better every day when it comes to defending information in static production environments. But what happens when magnetic, optical, or semiconductor media is repurposed or retired? This white paper defines media sanitation and how it fits into an overall security program, examines how attackers extract information from electronic media even after its been overwritten and it explores ways one can protect the organization from attacks, both casual and highly motivated.