Best Identity Management

Share this article:

Overall Category Winner and Winner for Best Password Management: Password Auto Repository from e-DMZ Security

The Password Auto Repository (PAR) was designed to provide a commercial solution to the problem of shared administrative password management. Designed in a purpose-built appliance, the PAR addresses the storage, release, update, and auditing of administrative passwords.

The solution also acts as a strong auditing solution, with time and date stamping to track password usage and where passwords are stored. Additionally, it keeps track of the history of all password versions and the changes made to them. A granular access control mechanism is provided to control who has access to each password, as well.

A purpose-built hardened appliance, the PAR includes a commercially embedded firewall (CyberGuard SG630) to protect the network interface. No interactive access is allowed. The hard disk is encrypted using AES256 disk encryption to protect against physical attack. The passwords themselves are also AES256 encrypted prior to being stored on the PAR.

FINALISTS:

• Citrix Systems for Citrix Password Manager

• Courion for PasswordCourier

• Digital Persona for DigitalPersona 3.2

• e-DMZ Security for Password Auto Repository

Winner for Best Authentication: Authentify-2F from Authentify

Authentify offers real-time, 2- or 3-factor authentication services synchronizing automated telephone calls to online users, undeniably contacting the person using the computer and conducting an exchange only they can complete.

Authentify's practical, cost-effective solution for user authentication easily layers with existing architectures while providing a strong audit trail. End-users need not remember anything, install software or carry devices.

FINALISTS:

• Aladdin Knowledge Systems for Aladdin eToken

• Authentify, Inc. for Authentify

• Comodo for Comodo - Digital Brand Verification

• Encentuate for Encentuate TCI

• VASCO Data Security for Digipass Plug-In for Microsoft IAS

Winner for Best Biometric Device: Authetify-VB from Authentify

Authentify's Voice Biometrics (VB) services enable organizations to quickly and cost-effectively provide real-time user biometric authentication during an Internet session. By leveraging the familiarity of telephone networks, Authentify ensures that deployment of stronger information security measures are practical for business and easy to use for consumers.

The company's patented process seamlessly integrates into existing online processes that have been developed for e-business, secure information access, and the distribution of security credentials.

FINALISTS:

• Authentify, Inc. for Authentify - VB

• Hectrix, Inc for ACTAtek

• UPEK, Inc. for UPEK TouchChip and TouchStrip Solutions

Winner for Best Single Sign-On: Encentuate TCI

Encentuate goes beyond SSO to automate access workflows and workstation security policies. The solution leverages a variety of authentication factors to provide SSO to any application without changing the infrastructure.

Dramatically enhances employee productivity and reduces enterprise costs due to faster deployment cycles and lower helpdesk costs. Delivers strong access security while maximizing convenience for users and IT administrators.

FINALISTS:

• Citrix Systems for Citrix Password Manager

• Encentuate for Encentuate TCI

• Impravata for Imprivate One-Sign 2.8

• Sentillion for Vergence SignOn Manager

Winner for Best Two-Factor Solution: Encentuate TCI

Encentuate uniquely leverages any building access and photo badge as the second factor to provide SSO and track access to all applications. The solution combines logical and physical access.

Delivers the highest ROI and convenience amongst all two-factor authentication solutions. Raises identity assurance and reduces TCO while enhancing user productivity and enabling regulatory compliance.

FINALISTS:

• ActivIdentity for ActivIdentity Secure Remote Access Solution

• Authentify, Inc. for Authentify - 2F

• Encentuate for Encentuate TCI

• KoolSpan, Inc for KoolSpan SecurEdge

• Secure Computing for SafeWord

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in News

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.