contents | business | |||||||
| CRYPTOCard Partners with Evidian CRYPTOCard announces its collaboration with Evidian, manufacturers of WiseGuard. The joint offering will increase the opportunity for resellers to offer an end-to-end access management security solution. CRYPTOCard's collaboration with Evidian increases security by eliminating the need for users to remember or document passwords - reducing help desk calls and related costs by as much as fifty per cent. The joint offering also increases user satisfaction and productivity by removing the need to remember, input, or manage password changes and makes it simple for organizations to comply with new security legislation and privacy laws such as SOX and HSPD-12. By combining two distinct purpose-built solutions, CRYPTOCard and Evidian provide improved functionality over alternative offerings from such vendors as ActivIdentity and RSA. The joint offering provides end users with a end-to-end access management security solution with such features as single sign-on, identity management, provisioning, and dynamic access control in all types of environments: from traditional applications to web/J2EE applications. The joint solution also provides a Primary Re-authentication feature, which prevents users from logging on, then leaving their workstation - thus preventing another user from accessing sensitive applications and data from their workstation. Productivity is also dramatically improved as the new solution provides the ability to switch between users within the same windows session. Resellers benefit from the opportunity to generate increased revenues through a differentiated offering. The joint offering also provides CRYPTOCard resellers with an excellent opportunity to increase service revenues. Evidian's WiseGuard provides unique selling points that add value to CRYPTOCard-based infrastructures. These include enabling users to delegate access for specific applications (in accordance with the company security policy), without having to pass over their credentials. Also, in addition to providing access policies by user, application, and time, a user can specify certain locations or workstations from which only certain applications can be accessed. write your comments about the article :: © 2007 Computing News :: home page |