Product Briefing: Authentication

Oct 2, 2001

Dayna Delmonico

Unfortunately, network and enterprise security is more important that any of us have dreamed possible. The very real threat of electronic terrorism bringing down global economies by wreaking havoc with the world's financial and business institutions is real.

For IT management, security is suddenly at the very top of every priority list. Where guarding against Web-based worms and viruses were a constant priority; suddenly every network and web user is suspect. Knowing who's on your networks and Web sites is now critical.

CrossNodes Technology Briefing on Authentication will give you a basic overview of the technology. This Product Briefing will help you narrow down product availability or provide additional alternatives for more robust authentication solutions.

Though instantaneous authentication help is available, there is much more to the authentication market and will be in the days to come.

Additional Resources on CIN
Each Technology Briefing acts as a reference on individual technologies and products, providing a knowledge base and guide to IT decision-makers in purchasing and deployment. Click here to reach a collection of previous Technology Briefings. Topics include: Firewalls, WLANs, network storage and others.

You can also go to the Great Docs section to find these Technology Briefings and other informative resources and documents on training and staffing, e-mail and Internet usage policies, a guide to project management and other topics.

In one week alone, Wall Street proved that data security, and authentication in particular, is now vital as investors injected millions into security technology companies. Many of those same companies are rapidly acquiring smaller security technology firms. The major player infighting, however, has gotten louder and stronger in the past few weeks.

There are two issues that authentication vendors have to settle --

  • Where the line gets drawn between a totally anamous Internet that users want and the right to know users that companies wants and law enforcement needs
  • Global authentication standards
It should come as no surprise that Microsoft's read on these issues are very different from Sun Microsystems. So much so that Sun and thirty-two of its closest friends have rapidly formed an Alliance around these issues. As of September 11, the luxury of fighting out the future of Internet-based E-commerce, as well as the security of internal networks and data disappeared.

Sun and friends "Liberty Alliance" was formed to manage authentication and identity in offline businesses and the Web while competing with Microsoft 's Passport Services and .Net. "Liberty Alliance" as envisioned is an "federated" authentication service where users will register once and all companies, in the "federation" can share identifying information. Though that portion is similar to Passport, Passport is an authentication technology; Liberty is a set of interfaces that allow existing authentication implementations to share information.

Whichever the de facto standard is ultimately based on, it will probably err on the side of caution rather than user privacy.

Vendor:  ActivCard
Product: ActivCard Gold
OS(s): Win 95, 98, 2000, ME, NT

Vendor: Aladdin Knowledge Systems 
Product: eToken Product Family
OS(s): Win 98, 2000, NT

Vendor: BioNetrix
Product: BioNetrix Authentication Suite

Vendor: CRYPTOCard
Product: CRYPTOAdmin
OS(s): Win NT

Vendor: Funk Software
Product: Steel-Belted Radius 
OS(s): Win NT; Novell; Solaris
Vendor: G-Lock Software
Product: Activity and Authentication Analyzer (AAAnalyzer)
OS(s): Win 98, 2000, ME, NT

Vendor: Netegrity
Product: SiteMinder
OS(s): Win NT; HP-UX; IBM-AIX; Linux; Solaris

Vendor: RSA Security
Product: SecurID
OS(s): Win NT; Novell; Unix

Vendor: Secure Computing
Product: SafeWord Product Family
OS(s): Win 2000, NT; HP-UX; Linux; Solaris

Vendor: Symantec Corp.
Product: Defender 
OS(s): Win 95, 98, 2000, ME, NT; Solaris

This briefing originally appeared on's


0 Comments (click to add your comment)
Comment and Contribute

Your comment has been submitted and is pending approval.



 (click to add your comment)

Comment and Contribute

Your name/nickname

Your email


(Maximum characters: 1200). You have characters left.