CONTACT    SIGN IN    SIGN UP
    
Other
Trusting Passwords: Best Practices for Threat-Proofing Credentials
Date: 05/15/2020 Length: 12 Cost: $99.00

            Linked In    

Abstract:
According to EMA primary research, passwords continue to be employed as the dominant method of authentication for accessing business IT resources, including applications, data, and other IT services. Building on a legacy that dates back to the early days of computing, passwords are ubiquitous across all types and sizes of organizations and are a key instrument for empowering workforces with responsible access to the information and resources they need to drive business success.
Author:

Steve Brasen


 




EMA Services

IT Professionals

EMA can help you:

  • Support your decisions
  • Succeed with key projects
  • Align IT with the business

Learn More!

IT Vendors

EMA can help you:

  • Build the right product
  • Reach the right prospects
  • Establish market credibility

Learn More!

EMA Advisory Notes Service

An Affordable Way to Stay on Top of Key Trends & Industry Events

Subscribe now

EMA Premium Research Service

In-Depth Insight into IT Management Benefits, Challenges & Best Practices in the Enterprise

Subscribe now




©1996-2020 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show