Microsoft®’s Forefront Review
Legacy signals
Legacy popularity: 2,020 legacy views
Legacy rating: 2/5 from 1 archived votes
Microsoft®’s Forefront Needs More Than Identity Management for Cyber Attack Prevention
Microsoft ‘s Forefront Identity Manager (FIM) 2010 provides IT with the tools needed for identity and access management through a SharePoint-based policy management console. Microsoft correctly targets the importance of identity management for users, devices, and services due to cyber attacks, regulatory mandates and privacy protection compliance. While FIM 2010 is designed around secure identity management, the logical question follows: How is the user properly identified during Windows authentication?
FIM 2010 has integrated passwords and certificates functions with smartcards to deliver a secure network. If the first link in the chain is insecure then the entire network is also insecure. Can you really trust and know who really is logging in, accessing files or purchasing unauthorized services? Smartcards two- or three- factors of authentication capabilities are a key component to establish trust.
Users who manual type in a user name and password are the weakest link in computer, network or cloud authentication. Not because passwords are insecure, but because how users choose and manage their passwords.
*Using a simple, easy to remember password
*Password written on sticky notes and posted on their monitors
*Using the same password for the company’s network as they use for their PlayStation account
*And not having proper malware protection on a home computer that allow thieves to steal passwords with a keylogger.
When combined with the functions and features of an ID badge, smartcards gives IT a single, secure credential to control the issuance, management and access within an entire organization. From the user’s perspective they insert a card into a reader, type a single PIN and/or present their finger to a biometric reader and that’s it. FIM 2010 does the rest. A win-win for IT since they have increased security and it’s convenient for the user – no more complex passwords to remember or type.
But which smartcard authentication is best, a password manager or a digital certificate. Both technologies have their pros and cons (see our “Security Technology Comparison” white paper). The better questions are: what is the environment, cost considerations, time to implement, value of data being protected, etc.? Certificate systems, especially Public Key Infrastructure (PKI), are very secure but also very expensive for most businesses to implement. Many systems require expensive smartcard chips, hardware modifications to the server, relationships with Certificate Authorities, annual certificate renewal fees, non-transferal of certificates when there is employee turnover, advanced IT training, and typically years to fully integrate. Certificates are great for those people that have to digitally sign documents and want the non-repudiation, but it’s not something every employee needs.
Access Smart® created a secure password manager for Windows called Power LogOn®. The user simply authenticates themselves with a PIN and/or biometric.
No more manually entering passwords that keyloggers can pick up.
No more employees writing passwords on sticky notes for others to find.
No more using the same simple password for every account.
Since Power LogOn has no annual subscription/renewal fees, no back-end server modifications, no extensive training and licenses are transferable makes Power LogOn affordable from the single business owner up to the large corporations, agencies and institutions. Power LogOn usually takes IT only a couple of days to fully implement thus implementing security faster than any certificate based solution. Power LogOn can also be configured to deliver up to 8-levels of authentication assurances.
*Something you have
*Something you know
*Something you are
*Something the card has
*Something the card knows
*Something the server and card knows
*Something an application and card knows
FIM 2010 focuses on Identity Management and Power LogOn addresses user authentication; together businesses and their employees have an integrated permissions based secure network. IT can eliminate the manual logon processes that cannot truly authenticate a user. Finally, with the low cost of ownership security is no longer determined by accountants but by the businesses desire to deliver privacy protection confidence to their customers.
Dovell Bonnettr
Founder & CEO
Access Smart
27762 Antonio Pkwy, L1-461
Ladera Ranch, CA 92694
Office: 949-218-8754
Website: www.Access-Smart.com
Article author
About the Author
Dovell Bonnett has been creating security solutions for computer users for over 20 years. In order to provide these solutions to consumers as directly, and quickly, as possible, he founded Access Smart. With each of his innovations, the end user — the person sitting in front of a computer — is his No. 1 customer.
This passion, as he puts it, to “empower people to manage digital information in the digital age” also led him to write the popular Online Identity Theft Protection for Dummies. Within the pervasive nature of our e-commerce and e-business community, personal information, from credit card numbers to your pet’s name, is more easily accessed, and identity theft and fraud has become an issue that touches every consumer.
Further reading
Further Reading
Article
Students Beware! Identity thieves are studying you!
It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...
Related piece
Article
Things to consider when trying to get out of debt!
On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...
Related piece
Article
Passwords Don't Have to Threaten Business Security
The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.
Related piece
Article
5 Mistakes to Avoid when Dealing with a Debt Collector
Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner
Related piece