Preview

We Do Have

Better Essays
Open Document
Open Document
8454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
We Do Have
The ROI case for smart cards in the enterprise
The benefits of a converged logical and physical access solution
A Datamonitor white paper prepared for

Publication Date: November 2004

www.datamonitor.com
Datamonitor USA 4th floor, 245 Fifth Avenue, New York, NY 10016 USA t: +1 212 686 7400 f: +1 212 686 2626 e: usinfo@datamonitor.com Datamonitor Europe Charles House 108-110 Finchley Road London NW3 5JJ United Kingdom t: +44 20 7675 7000 f: +44 20 7675 7500 e: eurinfo@datamonitor.com Datamonitor Germany Messe Turm Box 23 60308 Frankfurt Deutschland t: +49 69 9754 4517 f: +49 69 9754 4900 e: deinfo@datamonitor.com Datamonitor Asia Pacific Room 2413-18, 24/F Shui On Centre 6-8 Harbour Road Hong Kong t: +852 2520 1177 f: +852 2520 1165 e: hkinfo@datamonitor.com

The ROI case for secure access

INTRODUCTION
This Datamonitor white paper illustrates the return on investment (ROI) argument for investment in secure access smart card-based solutions in the enterprise. The paper focuses on the ROI benefits of smart cards for both authenticating users to IT networks and systems (logical access) and controlling access to facilities (physical access), with a further assessment of converged solutions that combine the two. Datamonitor’s analysis is supported by a recent survey of 53 enterprises in North America, which assesses the real and potential cost savings that can be realized from smart card deployments.

The importance of strong authentication
The ability to verify a user’s identity, typically referred to as authentication, has become an essential basis for trust in business relationships. Authentication establishes trust by proving the identity of a participant in any communication, or in the case of conducting electronic business, any transaction. Simply put, authentication solutions within the enterprise environment are designed to ensure that a person is who he/she claims to be. Authentication solutions are typically used as the basis for critical

You May Also Find These Documents Helpful

  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    There are countless steps that can be taken to safeguard a company’s data systems against intrusions. The company can update POS (Point-of-Sales) systems to EMV (Euro pay, MasterCard, and Visa) technological standards, implementing “layering” encryption and tokenization, and utilizing outsourced penetration tests to access and report on company’s current information security strength.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Prerequisite: CMIS 102. A comprehensive introduction to the protection of business information and the systems that support business processes. The objective is to identify common threats and attacks employed against Web-accessible applications, analyze the role of security models and architectures, explain the role of cryptography, and analyze issues related to security management and network security.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    5) What is the name of the process which proves you are who you say you are? D) Authentication…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays