Reaching the Tipping Point for Two-Factor Authentication
|
|
- Kelley Richard
- 8 years ago
- Views:
Transcription
1 Reaching the Tipping Point for Two-Factor Authentication Written by Don Jones Quest Software, Inc. White Paper
2 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information, protected by copyright. No part of this document may be reproduced or transmitted for any purpose other than the reader's personal use without the written permission of Quest Software, Inc. WARRANTY The information contained in this document is subject to change without notice. Quest Software makes no warranty of any kind with respect to this information. QUEST SOFTWARE SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTY OF THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Quest Software shall not be liable for any direct, indirect, incidental, consequential, or other damage alleged in connection with the furnishing or use of this information. TRADEMARKS Quest, Quest Software, Quest Defender and the Quest Software logo are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Other trademarks and registered trademarks used in this document are property of their respective owners. World Headquarters 5 Polaris Way Aliso Viejo, CA info@quest.com Please refer to our Web site ( for regional and international office information. Updated October, 2009
3 CONTENTS INTRODUCTION...1 WHAT IS TWO-FACTOR AUTHENTICATION?...2 COMMON CHOICES FOR TWO-FACTOR AUTHENTICATION... 2 BUSINESS DRIVERS FOR TWO-FACTOR AUTHENTICATION... 3 INCREASING TWO-FACTOR AUTHENTICATION ADOPTION... 4 HURDLES TO TWO-FACTOR ADOPTION... 5 ACTIVE DIRECTORY INTEGRATION: THE TIPPING POINT... 6 ABOUT THE AUTHOR...7 ABOUT QUEST SOFTWARE, INC...8 CONTACTING QUEST SOFTWARE... 8 CONTACTING QUEST SUPPORT... 8
4 INTRODUCTION Two-factor authentication is becoming more common in the world s largest organizations, and many medium-size and smaller organizations are also looking hard at it. What is the appeal of this form of authentication? When organizations adopt it, what are their driving reasons? And, perhaps most importantly, which organizations are not adopting two-factor authentication, and why? When will the industry reach a tipping point, where two-factor authentication will become the norm? This paper examines these questions and their answers. 1
5 WHAT IS TWO-FACTOR AUTHENTICATION? The first multi-user computers used single-factor authentication, which almost every computer user is familiar with: a username and password. But wait don t a user name and a password represent two factors? No. Both of those items are something you know information stored in your brain that also might be recorded on paper or elsewhere and therefore they represent only a single factor for authentication. True two-factor authentication consists of two items from different categories: Something you know, such as a user name, password, or PIN Something you have, such as a hardware token Something you are, such as a fingerprint Examples of two-factor authentication, therefore, would include: A hardware token (something you have) plus a PIN (something you know) A user name (something you know) and a fingerprint scan (something you are) Extremely secure systems may require more than two factors (multi-factor authentication), but most business systems can be adequately secured by two-factor authentication. Common Choices for Two-Factor Authentication In most current two-factor authentication systems, the something you know factor is almost always a user name a PIN, or both. The second factor is commonly some form of hardware, software or biometric, such as a: Hardware token Software token Pattern-based, one-time password Smart card Single-use PIN hardware token Finger print or retinal scan Hardware and software tokens are the most popular second factor options because they re portable, simple to manage, easy to use and more reliable than biometrics. 2
6 Hardware tokens have traditionally been the least expensive second factor option. These tokens display a single-use password, which is created by a predetermined mathematical algorithm. Authentication servers on the network use the same algorithm, so with a user name or PIN, the server can determine the password that the user s token is displaying at that moment and require the user to enter it for authentication. The most popular hardware tokens utilize an industry-standard algorithm known as OATH; these tokens are cross compatible with each other as well as with a variety of server-based authentication systems. USB hardware tokens can be carried on a key ring and plugged into nearly any modern computer. Today, software tokens are slowly overtaking hardware tokens in popularity and may surpass them in a year or two. Mobile computing is driving this increased use. For example, some systems are able to issue single-use passwords in response to an SMS text message sent from an employee s cell phone. This is an ideal zero-hardware solution for mobile employees, since nearly all of today s cell phones and carriers support SMS messaging. PDAbased software tokens replicate the functionality of hardware token by generating single-use passwords on a smart phone or personal digital assistant. All of these solutions are typically low-cost, easily portable, and easy to use. Active Directory also offers basic built-in support for smart cards, which are used internally by Microsoft and other organizations. A downside of smart cards is that they tend to be expensive; they require the installation of a reader and software. Also, users cannot rely on them when authenticating from a computer that lacks a compatible reader, such as an Internet kiosk. Business Drivers for Two-Factor Authentication The main reason organizations adopt two-factor authentication is to reduce risk associated with unauthorized access and regulatory compliance. Any broken authentication scheme will give unauthorized individuals access to organization information, risking significant damage to the business. And failing to comply with legal requirements and industry standards that mandate security procedures carries significant fines and penalties. These compliance initiatives include HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, the Payment Card Industry s Data Security Standard, as well as various rules for federal agencies and contractors. How does using single-factor authentication allow security risks and fall short in meeting compliance requirements? Single-factor authentication systems are simply too easy to break. For example, Microsoft Active Directory does not store user passwords in clear text, or even in an encrypted form; it stores the result of a one-way cryptographic hash, meaning the stored password cannot be reverse-engineered to reveal the original password. However, the hash algorithm is well known, so it s possible for an attacker to create a dictionary of possible passwords, hash them, and then compare 3
7 those values to the stored values in Active Directory. A match between two hashes will reveal the clear-text password from the dictionary, which is why this type of attack is commonly called a dictionary attack. While generating the dictionary takes some time, the actual attack can be performed very rapidly. Pre-generated dictionaries are available that can quickly crack passwords of up to 10 characters in length, using any combination of characters including supposedly secure passwords that use a combination of letters, numbers, and symbols. This threat requires increasingly complex passwords, which simply drives attackers to create ever-larger dictionaries. In the arms race between attackers and complex passwords, the attackers will always win. Any system secured only by passwords can be easily cracked by a moderately-skilled attacker with access to the stored passwords and a few minutes of time. Even if more complex passwords could stop attackers, they are not a good solution. That s because End users will constantly forget their passwords, lock themselves out of their accounts, and call the help desk to resolve the problem. This significantly increases support costs. Today many businesses have chosen to abandon passwords in favor of twofactor authentication systems that let users remember less information and offer greater security. For example, you cannot lose a fingerprint, and a lost smart card or hardware token can be easily invalidated and rendered useless to attackers. Increasing Two-Factor Authentication Adoption Two-factor authentication is increasing in both large organizations and technology-centric organizations. Large organizations are also more likely to be regulated by one or more legislative or industry security requirements, making stronger authentication compelling. However, because they also tend to manage their IT overhead more closely, they recognize the cost savings of reduced help desk calls for password resets and account lockouts. Technology organizations, even smaller ones, tend to be quicker to recognize the value of two-factor authentication for reducing help desk overhead and improving security. Because their main product is often easy-to-steal intellectual property, they tend to suffer more from industrial espionage. This makes the security offered by two-factor authentication appealing. Technology-focused organizations that are subject to industry or legislative security requirements (such as online retailers) are especially quick to adopt two-factor authentication for the same reasons large organizations do. Banks and other financial organizations use two-factor authentication to secure organizational and customer information. In fact, the rush to 4
8 implement two-factor authentication by major banks and major online retailers is bringing us closer to the tipping point where two-factor authentication becomes a baseline requirement Hurdles to Two-Factor Adoption What stands in the way of even more widespread adoption of two-factor authentication? One alleged hurdle to two-factor authentication is end-user acceptance. There s a general sense that end users will have difficulty understanding and using two-factor authentication. In fact, even though end users are often too resistant to technology changes, industry experience reveals that they are able to quickly adopt to two-factor authentication. Most users find two-factor authentication easier and more convenient than user names and passwords. For example, smart cards only require users to remember a four- to six-digit PIN, and inserting a card into a reader slot is similar to using an automated teller machine (ATM). Another hurdle is that many organizations fear that the cost of two-factor authentication will be high and never investigate it. However, hardware tokens actually have a very small per-unit cost, and deployment costs, including the cost of the back-end software, are rarely as high as organizations anticipate. And help desk calls for password resets or account unlocks can cost as much as $33 per call, so even the most expensive twofactor authentication will quickly repay its purchase cost. An additional barrier is the organization s mistaken belief that it is unlikely to encounter a security problem. Organizations that have never experienced a breach may feel there s no need to spend time and money implementing better security. These organizations are fooling themselves: a glance at any technology news site often reveals a monthly litany of victims of the it will never happen to us mentality. The same organizations that willingly (and intelligently) spend thousands on property or liability insurance even though they ve never been the victim of a flood or fire should recognize that twofactor authentication is also an insurance policy. However, unlike most policies, two-factor authentication requires only a one-time investment, rather than ongoing premium payments. Compared to the cost of other insurance policies, two-factor authentication is extremely cost-effective. If neither necessity, acceptance nor cost is a valid deterrent to adopting single-factor authentication, what is? In most instances, the main hurdle to adoption of two-factor authentication is integration: making two-factor authentication work with the organization s existing systems and resources. Microsoft Active Directory is one of the most common identity systems in use today, and integrating a two-factor authentication system with it is critical to a successful adoption and deployment. 5
9 Active Directory Integration: The Tipping Point Quest Defender ( is specifically designed to extend Active Directory to support a variety of two-factor authentication schemes, including hardware tokens. It allows any system that relies on, or integrates with, Active Directory to participate in two-factor authentication. In fact, adding Defender can often immediately enable two-factor authentication across the entire enterprise. Defender permits phased deployments, enabling some users to continue using passwords while small groups are migrated to two-factor authentication. This helps to reduce the impact of a major deployment as well as lower attendant overhead and support costs. Defender is centrally administered through Active Directory; Active Directory is even used to store each user s individual hardware token assignment; additional databases are not required. In addition to supporting any OATH-compliant hardware tokens, Defender supports smart cards as well as mobile (sent via SMS text messaging), software, PDA-based, pattern-based, and USB hardware-based tokens. This gives organizations a wide range of choices. Defender also supports the use of mixed token types, enabling organizations to determine the right type of token on a per-user basis. Defender s detailed auditing capabilities help organizations that are subject to industry or legislative security requirements maintain and prove compliance. Defender is capable of using several encryption algorithms to secure communications, ensuring compliance and a high level of security. Defender helps bring the industry to the tipping point by integrating two-factor authentication with Active Directory, and offering flexible security token choices. Organizations can now properly justify the cost of a two-factor authentication deployment, and significant barriers to its adoption are removed. 6
10 ABOUT THE AUTHOR Don Jones has more than a decade of professional experience in the IT industry. He is the author of more than 30 IT books, including Windows PowerShell: TFM, VBScript, WMI, and ADSI Unleashed and Managing Windows with VBScript and WMI. He s a top-rated speaker who is in demand at conferences such as Microsoft TechEd and TechMentor. He also writes the monthly Windows PowerShell column for Microsoft TechNet Magazine. Don is a multiple-year recipient of Microsoft s Most Valuable Professional (MVP) Award with a specialization in Windows PowerShell. Don s broad IT experience includes work in the financial, telecommunications, software, manufacturing, consulting, training, and retail industries and he s one of the rare IT professionals who can not only cross the line between administration and software development, but also between IT workers and IT management. Don maintains a high degree of awareness in multiple facets of the IT industry, enabling him to perform both high-level and detailed analyses of new technologies and techniques. 7
11 ABOUT QUEST SOFTWARE, INC. Now more than ever, organizations need to work smart and improve efficiency. Quest Software creates and supports smart systems management products helping our customers solve everyday IT challenges faster and easier. Visit for more information. Contacting Quest Software Phone: Mail: Web site: (United States and Canada) Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around the clock coverage with SupportLink, our web self-service. Visit SupportLink at From SupportLink, you can do the following: Quickly find thousands of solutions (Knowledgebase articles/documents). Download patches and upgrades. Seek help from a Support engineer. Log and update your case, and check its status. View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: Support Guide.pdf 8
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationGain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock
Gain Control of Space with Quest Capacity Manager for SQL Server written by Thomas LaRock Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is
More informationOvercoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.
Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
More information10 Simple Steps for Boosting Database Performance in a Virtualized Environment
10 Simple Steps for Boosting Database Performance in a Virtualized Environment Written by Dr. Bert Scalzo Quest Software, Inc. White Paper 10 Simple Steps for Boosting Database Performance in a Virtualized
More informationQuest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
More information8.3. Competitive Comparison vs. Microsoft ADMT 3.1
8.3 Competitive Comparison vs. Microsoft ADMT 3.1 Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described
More informationFile Shares to SharePoint: 8 Keys to a Successful Migration
File Shares to SharePoint: 8 Keys to a Successful Migration Written by Doug Davis Director, SharePoint Product Management Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2008. All rights
More informationHow To Send E Mail From An Exchange 2007 To A Domain Name Address Book On A Domain Address Book (For A Domain) On A Pc Or Mac Xp (For An Ipod) On An Ipo (For Windows 2007) On Your Ip
Lotus Domino Server and Exchange 2007 Server SMTP Routing using Smart Hosts Supplemental - Version 1.1, Dated June 2, 2009 Contents Purpose... 4 Current Lotus Domino Environment... 5 Sample Outbound Message
More informationAchieving Successful Coexistence Between Notes and Microsoft Platforms
Achieving Successful Coexistence Between Notes and Microsoft Platforms Written by Technology Strategy Research LLC White Paper Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationStorage Capacity Management for Oracle Databases Technical Brief
Storage Capacity Management for Oracle Databases Technical Brief Written by Name Title Quest Software, Inc. Technical Brief Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationQuest InTrust for Active Directory. Product Overview Version 2.5
Quest InTrust for Active Directory Product Overview Version 2.5 Copyright Quest Software, Inc. 2006. All rights reserved. This guide contains proprietary information, which is protected by copyright. The
More informationTen Things to Look for in a SharePoint Recovery Tool
Ten Things to Look for in a SharePoint Recovery Tool Written by Ilia Sotnikov Product Manager, SharePoint Management Solutions Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2009. All
More informationImplementing Database Development Best Practices for Oracle
Implementing Database Development Best Practices for Oracle Written by, John Pocknell Product Manager, Toad for Oracle & Toad Data Modeler Quest Software, Inc. Technical Brief Copyright Quest Software,
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationLegal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk
Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Written by: Quest Software, Inc. Executive Summary Copyright Quest Software,
More informationQuest SQL Optimizer 6.5. for SQL Server. Installation Guide
Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationformerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
More informationQuest Management Pack for AS400. Written by Quest Software, Inc.
Quest Management Pack for AS400 Written by Quest Software, Inc. 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information, protected by copyright. No part of this document
More information2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer
What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationQuest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationPragmatic Business Service Management
Pragmatic Business Service Management Written by Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationHow the Quest One Identity Solution Products Enhance Each Other
Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary
More informationFoglight 1.0.0.0. Cartridge for Active Directory Installation Guide
Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationQuest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationTechnical Brief. Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle
Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle Written by Tom Sager, DBA team leader E. ON U.S. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS
More informationWeb Portal Installation Guide 5.0
Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationTop 10 Most Popular Reports in Enterprise Reporter
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationUnderstanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
More information10.2. Auditing Cisco PIX Firewall with Quest InTrust
10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationWhite Paper. Getting Your Macs Under Control with System Center Configuration Manager 2007. Really?
Getting Your Macs Under Control with System Center Configuration Manager 2007. Really? Written by Don Jones Co-Founder, Concentrated Technology Microsoft MVP White Paper 2009 Quest Software, Inc. ALL RIGHTS
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationQuick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationBlackShield Authentication Service
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
More informationQuest Management Agent for Forefront Identity Manager
Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationAn Oracle White Paper December 2010. Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication
An Oracle White Paper December 2010 Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication Introduction Protecting data in the digital age is critical. A security breach, if
More informationManage, Extend, and Simplify Group Policy using Quest Group Policy Solutions
Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Technical Brief written by Darren Mar-Elia Chief Technology Officer Windows Management Quest Software, Inc. Copyright Quest
More informationA brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
More informationDigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
More informationSecurity Guide for ActiveRoles Server 6.1
Security Guide for ActiveRoles Server 6.1 Written by Einar Mykletun, Ph.D Security and Compliance Architect Quest Software, Inc. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document
More informationformerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
More informationEnterprise Single Sign-On 8.0.3
For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationMulti-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
More informationSimplifying Security with Datakey Axis Single Sign-On. White Paper
Simplifying Security with Datakey Axis Single Sign-On White Paper Copyright and trademark notice 2003 Datakey Inc. All rights reserved. Version 1.0 No part of this document may be reproduced or retransmitted
More informationAn Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.
An Introduction to Toad Extension for Visual Studio Written By Thomas Klughardt Systems Consultant Quest Software, Inc. Contents Introduction... 2 Installation... 3 Creating Projects... 4 Working with
More informationBig Brother Professional Edition Windows Client Getting Started Guide. Version 4.60
Big Brother Professional Edition Windows Client Getting Started Guide Version 4.60 Copyright Quest Software, Inc. 2002 2011. All rights reserved. This guide contains proprietary information, which is protected
More informationMicrosoft Active Directory Backup and Recovery in Windows Server 2008. written by Shawn Barker Product Manager, Quest Software, Inc.
Microsoft Active Directory Backup and Recovery in Windows Server 2008 written by Shawn Barker Product Manager, Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
More informationThe Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
More informationManaging the Risk of Privileged Accounts and Privileged Passwords in Civilian Agencies
Managing the Risk of Privileged Accounts and Privileged Passwords in Civilian Agencies Reduce Risk while Streamlining Administrative Workflows Written by Dell Software Abstract Even IT environments that
More informationChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationEntrust IdentityGuard
+1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
More informationOrganized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
More informationWHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
More informationSecurity Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationStrong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
More informationEnterprise Single Sign-On 8.0.3 Installation and Configuration Guide
Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains
More informationSharePlex for SQL Server
SharePlex for SQL Server Improving analytics and reporting with near real-time data replication Written by Susan Wong, principal solutions architect, Dell Software Abstract Many organizations today rely
More informationEight Ways Better Software Deployment and Management Can Save You Money
Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by
More informationFoglight Experience Monitor and Foglight Experience Viewer
Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationThe Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationAccount Access Management - A Primer
The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2
More information7.5 7.5. Spotlight on Messaging. Evaluator s Guide
7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationEnterprise Single Sign-On
Enterprise Single Sign-On The Holy Grail of Computing Written by Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is protected
More informationCompliance and Security Challenges with Remote Administration
Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges
More informationWhite paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
More informationChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDATA GOVERNANCE EDITION
Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationSolving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
More information8.7. Resource Kit User Guide
8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under
More information4.0. Attribute Mapping Rules
4.0 Attribute Mapping Rules Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide
More informationDell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
More informationGetting the Most From. Your Help Desk
. Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk
More informationFoglight 5.5.5. Managing Microsoft Active Directory Installation Guide
Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationQuest Privilege Manager Console 1.1.1. Installation and Configuration Guide
Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationCA ArcotOTP Versatile Authentication Solution for Mobile Phones
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
More information6.7. Quick Start Guide
6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationAbout Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
More informationDell One Identity Quick Connect for Cloud Services 3.6.1
Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved
More informationAegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationWHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More informationRSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationWhite Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software
Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Written by Tom Crane, Product Manager, Quest Software, Inc. Edited by James Galvin, Microsoft Sr. Product Manager,
More informationSteps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
More information