Access Privileges Converge

November 2006
Bank Technology News;Nov2006, Vol. 19 Issue 11, p1
Trade Publication
The article focuses on access privileges in financial firms. Banks spend a lot of resources on access control systems. By logging in with a virtual private network or badging into a restricted area with unauthorized people, workers defy logical security. Merging physical and information technology security systems is a solution for this problem found by American Bank. The converged system has been provided to American Bank by Imprivata Inc.


Related Articles

  • After theft, bank tightens online security. McMillan, Robert // Network World;5/30/2005, Vol. 22 Issue 21, p18 

    This article reports that Bank of America has tightened its security days after confirming that information on approximately 60,000 customers had been stolen by an identity-theft ring. The Charlotte, North Carolina-based bank will offer a service called SiteKey that will make it harder for...

  • BioPassword Readies For Battle. McLaughlin, Kevin // CRN;4/2/2007, Issue 1234, p38 

    The article features the Enterprise 3.0 tool launched by software-based authentication vendor BioPassword to add tighter security, thin-client support and integration with the Citrix Access Gateway Virtual Private Network and Microsoft Outlook Web Access. The company is positioning the software...

  • Deutsche Bank gives remote users a choice. Messmer, Ellen // Network World;7/14/2003, Vol. 20 Issue 28, p15 

    Focuses on Deutsche Bank AG's decision to offer an alternative virtual private network (VPN) based on the Secure Sockets Layer computer network protocol. Reason for the move; Benefits to customers; Use of scanning software from Whole Security to supplement its Neoteris VPN for secure remote...

  • A Proficient 5C Approach to Boost The Security in the SaaS Model's Technical Architectural Components. Balasubramanian, R.; Aramudhan, M. // International Journal on Cloud Computing: Services & Architectur;Dec2013, Vol. 3 Issue 6, p1 

    For anything that involves delivering hosted services over the internet is cloud computing. These services are classified as: IaaS,SaaS,PaaS.This paper focuses on SaaS security measures. SaaS is a cloud based productivity suite that helps the business people to connect and work from anywhere on...

  • NEW LOGMEIN CENTRAL/LOGMEIN HAMACHI2 CREATE VPN.  // Networks Update;Nov2009, Vol. 21 Issue 11, p3 

    The article offers information on the LogMeIn Central and LogMeIn Hamachi2 Virtual Private Network (VPN) services from LogMeIn Inc. LogMeIn Central offers small businesses and information technology (IT) professionals with a secure and cost effective way to deliver remote computer access and...

  • SSL VPNs---An Independent Taxonomy. Bruno, Charles; Suryaprasad, Deepa // Business Communications Review;Nov2004, Vol. 34 Issue 11, p28 

    This article presents a brief summary of the primary Secure Sockets Layer (SSL), virtual private networks (VPN) functions that should be central to any customer's SSL VPN evaluation. One of the ironies of SSL VPNs is that the complexity of this remote access technology can be masked almost...

  • Positive Identification in a Wireless World. Ardoin, Paul // Database & Network Journal;Feb2003, Vol. 33 Issue 1, p9 

    Discusses the significance of implementing security features that include access control appliances or virtual private networks to protect wireless systems instead of wireless encryption to establish a secure session. Vulnerability of the fixed passwords to inherent attacks by brute-force...

  • Are Your Road Warriors Ready for Battle? Kolappan, Rama // Security: Solutions for Enterprise Security Leaders;Jan2014, Vol. 51 Issue 1, p42 

    The article focuses on several capabilities which can be considered when choosing a solution to allow employees to securely access and share mobile content. Topics discussed include centralized information technology (IT) control and management, different cloud development options, and secure...

  • Economic downturn a catalyst for telecommuting -- and security breaches.  // NetworkWorld Asia;Jun/Jul2009, Vol. 5 Issue 3, p26 

    The article focuses on the benefits and threats of telecommuting on organizations in Asia. It cites that telecommuting has been helpful in increasing employee productivity, profitability and effectiveness. However, it emphasizes the need for businesses to consider the threat of telecommuting on...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics