TITLE

Simplifying Sign-on IDs

PUB. DATE
June 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2007, Vol. 44 Issue 6, p36
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the move of banks and financial institutions to implement Single Sign-on (SSO) solutions in the U.S. The SSO approach would alleviate users' password burden, tighten security and ensure compliance with intensifying audit regulations, which is a high-profile situation that requires careful and thorough evaluation. Details about the implementation of SSO in the security system of Enterprise Bank & Trust Co. are offered.
ACCESSION #
26543486

 

Related Articles

  • STEALING SHEEP IN THE NIGHT: FINANCIAL INSTITUTION SECURITY IN THE DIGITAL AGE. Bauerle, James F. // Banking Law Journal;May2001, Vol. 118 Issue 5, p467 

    Discusses financial institution security in the digital age. Hypothetical case of computer fraud at a fictional financial institution; Need for Internet financial services security; List of security measures in the Guidelines Establishing Standards for Safeguarding Customer Information; Steps...

  • Consumers Do Want to Be Partners in Security. van Dyke, James // Bank Technology News;Oct2009, Vol. 22 Issue 10, p38 

    In this article the author discusses the potential of customers to partner with financial institutions on security monitoring in the U.S. He notes several methods preferred by customers to create the shared account security responsibility including better authentication, alerts, and user-defined...

  • Voice Authentication Takes Hold. COSTANZO, CHIS // Bank Director;2014 3rd Quarter, Vol. 24 Issue 3, p23 

    The article looks at the adoption of voice biometrics systems by several financial institutions for fraud prevention. Topics mentioned include the need to improve verification routines that were established since the late 1990s, pilot test conducted by Tangerine Bank for voice authentication for...

  • Provisional Measures on the Business Management of Derivative Product Transactions of Financial Institutions. China Banking Regulatory Commission // Chinese Law & Government;Jul/Aug2010, Vol. 43 Issue 4, p12 

    The article discusses the provisional measures regarding the management of transactions for derivative products of financial institutions from the 55th Chairman's Meeting of the China Banking Regulatory Commission on December 28, 2006. It says that the measures were made based on the Banking...

  • Keeping Cyber Thieves From Holy Grail.  // Credit Union Journal;10/10/2011, Vol. 15 Issue 39, p6 

    In this article the author discusses aspects of the increase in cyber attacks on credit union (CU) networks and other financial institutions in 2011 and the need for increased network security. He cites the Dell SecureWorks report that in 2011, attempted cyber attacks in its 582 CU clients have...

  • One Year After Target Breach, Consumers Vulnerable as Ever. Dan Berger, B. // American Banker;12/22/2014, Vol. 179 Issue 195, p00 

    The article discusses the need for retailers to be subject to national data security standards and breach notification safeguards applicable to banks and credit unions to help prevent future data breaches. Topics discussed include court ruling that financial institutions affected by retailer...

  • RSA Announces Findings of Annual Consumer Online Fraud Survey.  // Database & Network Journal;Feb2007, Vol. 37 Issue 1, p24 

    The article reports on the findings of the fourth annual Financial Institution Consumer Online Fraud Survey conducted by RSA Security Inc. in December 2006. The survey results indicate that 91 percent of account-holders are willing to start using a new authentication method if their banks...

  • CHAPTER 3: Security Department: Structure and Function.  // Bank Security Desk Reference;Mar2011, Vol. 1, p3-1 

    Chapter 3 of the book "Bank Security Desk Reference" is presented. It discusses the structure and function of a financial institution's security department. The duties and responsibilities of the security department are listed which include physical, personnel, and information security. It also...

  • EVOLVING DDoS ATTACKS PROVIDE THE DRIVER FOR FINANCIAL INSTITUTIONS TO ENHANCE RESPONSE CAPABILITIES. PERETTI, KIMBERLY K.; DEPALO, MAKI // Banking Law Journal;Jun2013, Vol. 130 Issue 6, p513 

    The article discusses Distributed Denial-of-Service (DDoS) attacks by cyber criminals and the targeting of financial sector websites in the U.S. as of June 2013. The Dirtjumper crimeware kit, which is commonly used by cyber criminals, is addressed. Financial fraud prevention, DDoS variants, and...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics