Network policy enforcement and electronic com-merce both depend on a single concept: trust. Once I'm reasonably certain I know who you are-reason-abty certain being a measure that varies by organization-I'll let you interact with my network and applications according to rules I've established. The administrator must act as gatekeeper, ensuring trust is not misplaced. This isn't easy: Within a few years, half of today's more robust methods of customer authentication won't be strong enough to safeguard against phishing and malware, according to Gartner. And the price of failure is climbing as the value of network transactions rises; perimeters become more porous as greater numbers of employees, partners and customers log in from remote locations and/or wireless-ly; and the reality of government regulations sinks into executive office suites. Not surprisingly, network administrators are increasingly focused on authentication as one of the key components of security, along with authorization, administration and auditing.
展开▼