Sisk, Michael
February 2005
Bank Technology News;Feb2005, Vol. 18 Issue 2, p36
Trade Publication
Reports on the development of BMC System, a technology involving password management and user provisioning systems in making daily reassignments for bank tellers of Bank of America Corp. in the U.S. Efficacy of the initiative evidenced by reduced fraud in the bank; Capacity of the BMC system to track the switching of access rights; Significance of the password management to provide cost savings for the bank in terms of saving time within information technology departments.


Related Articles

  • Group test: authentication. Lipinski, Michael // SC Magazine: For IT Security Professionals (UK Edition);Feb2009, p40 

    This section focuses on software for enterprise strong authentication. The combination of username and password is known as the first factor of authentication. Solutions include biometric, PIN-based, out of band and knowledge-based, which provided an added layer of security. The author says...

  • Infosecurity Europe 2006: Two Factor Authentication Meets The Password. Kemshall, Andy // Database & Network Journal;Feb2006, Vol. 36 Issue 1, p14 

    The article provides techniques for authentication of operating systems in replacement of the password. One approach is to replace the log-on components within the desktop with the use of a token, according to leading Two-Factor token vendors. The other one uses a revolutionary patented solution...

  • Computer Passwords 'up for grabs'.  // Database & Network Journal;Aug2006, Vol. 36 Issue 4, p17 

    The article highlights the survey conducted by Cyber-Ark, an information technology (IT) firm, regarding computer passwords. The survey revealed that half of the IT professionals employed by large-sized companies anticipate it would be relatively easy to gain the core passwords for their...

  • Firewalls can help guard your company's network. Watt, Michael // Long Island Business News (7/1993 to 5/2009);01/18/2002, Vol. 49 Issue 3, p37A 

    Discusses the specifics of firewalls in Internet security. Agreement to have an Internet policy in the handbook of employees; Importance of having password; Filtration of information coming from the Internet connection into the computer system.

  • Your passwords can either break you or save you. MacLeod, Calum // SC Magazine: For IT Security Professionals;Jan2005, p10 

    This article offers tips on computer security. The backbone of every enterprise infrastructure is a network of servers, network deices, security and other infrastructure that creates the complex communications network of a company. Every day, systems, network and security administrators log onto...

  • How Secure Is Too Secure? Polich, Paul // TechDecisions;Mar2010, Vol. 12 Issue 2, p10 

    The article discusses the extranet configuration of an organization that could provide security as well as ease of access. Suggestions for solving the computer security problem include the two-factor access through a user name and password and applying additional security that could prevent the...

  • Is Your Password Secure? Balasubramanian, V. // Dataquest;3/15/2014, Vol. 32 Issue 5, p64 

    The article discusses the importance of proper password management to combat cyber threats. It notes that cyber criminals are increasingly targeting the login credentials of employees and administrative passwords of information technology (IT) resources. It suggests using a unique password for...

  • oddiT.  // ITNOW;Nov2007, Vol. 49 Issue 6, p34 

    The article presents several online news on information technology. An online entry emphasizes the drawbacks of passwords. Another entry announces the development of a biodegradable laptop. Google will give a $30 million award to anyone who a can send a robot on the moon and have it perform some...

  • 8 Tips from the Trenches. Mahoney, Steve // Windows IT Pro;Sep2010, Vol. 16 Issue 9, p27 

    This article offers tips on handling various computer-related problems from information technology (IT) professionals. The professionals include Steve Mahoney, Brandon Jones, and Ortac Demirel. Such tips include using a paraphrase to replace required complex passwords, using Active Directory...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics