SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Identix (IDNX)

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: David who wrote (16436)1/19/2000 8:05:00 PM
From: DCBEN   of 26039
 
David, Brad,

Looks like we have another champion: KPMG

At RSA they announced they have solutions to secure e-commerce for their customers. They combine any of 5 applications. Look at #s 2 and 5.
At the RSA Conference, KPMG's demonstration of its capabilities for clients included:

-- Using certificates from Baltimore, CyberTrust, Entrust and VeriSign, members of the KPMG IRM team demonstrated secure authentication to a PeopleSoft HR module, enabled by SHYM Technologies.

-- Using biometric technology from Identicator Solutions, members of the KPMG IRM team demonstrated positive authentication to Microsoft NT workstations and domain services.

-- They also demonstrated the ability to gain secure remote access in an extranet environment to SAP FI and MM modules using CyberTrust certificates with enCommerce's getAccess. CyberTrust's External Authorization System provides a single administration control point to enroll a user in getAccess and issue a public key certificate using CyberTrust's Certificate Management System (CMS).

-- Furthermore, KPMG professionals issued a public key certificate using Baltimore Technologies' UniCert Registration Authority and Certification Authority and used the newly generated certificate to exchange secure electronic mail.

-- Using a SecurID token to access the user's personal security data, the KPMG team provided secure access to an Oracle database via RSA Security Inc.'s KEON. This can be expanded to provide secure access to any application linked to the KEON Security Manager. Van Ranst
called this reduced sign-on the "ultimate in user convenience." Authentication is needed when the user initially signs-on and thereafter authentication of the user would be maintained as the user moves from application to application.

Here's the link: biz.yahoo.com

Do I get a Wendell?

Ben
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext