Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
How easy is identity management?
Wednesday - 10/2/2013, 12:06am EDT
The move to the cloud is forcing federal information technology professionals to consider a wide range of options for authentication.
Identity management has been gaining interest in the federal community.
In fact, NIST is sponsoring a plenary meeting in October with a discussion on developing standards for identity management in the cloud.
During the interview, White talks about the positives and negatives of a variety of systems that enterprises can use for authentication.
Many will say that user name and password is a system that is antiquated and too easily breached.
DAON has systems that incorporate multiple factors for identification, including face recognition, voice recognition, and even combining those with geographic confirmation with your smart phone.
When a consumer product includes technology that incorporated biometrics, then it is time for enterprises to catch up.