White
Papers
These white papers are offered to provide you with a deeper understanding
of the philosophy and technologies behind the WSA. They are in Adobe's
PDF format.
Passwords and Subscriber
Services. What are subscriber services and why are
they important to business? How are passwords used today? What are
the problems and costs with passwords?
Comparing
Web Authentication Methods. What are the commonly used
methods for web user authentication? How do they compare?
Phishing Passwords.
Why are passwords vulnerable to phishing attacks? How does the Sevan
WSA neutralize phishing for authentication passwords?
Authenticating
the Person. What are the differences between certificate-based
authentication and other forms of authentication? Does any method
actually authenticate an individual person? Why is certificate-based
authentication secure?
Identity
Authentication™. What are subscriber services?
How does Identity Authentication™ work? How is it different
from password solutions?
Common Credentials.
How Sevan's certificate-based authentication simplifies single sign-on
and federated authentication.
User Authentication with
Public Key Cryptography. What is Public Key Cryptography?
How is it used to authenticate users on the Web? Why is it better
than password systems?
Storing and Protecting
Certificates. What are the pros and cons of storing
certificates in browsers, smart cards, and tokens?
Security Benefits
of the Sevan WSA. How does the WSA protect the servers
and the users? What are the other security features besides Identity
Authentication™?
Sevan WSA Network
Configurations. How does the WSA co-exist with firewalls,
load balancers, and other networking devices?
Sevan
WSA in Directory-Driven Enterprises. How does the Sevan
WSA work with LDAP Directories to serve as an enforcement point
for web content and applications?
Resource-Centric
Access Management. What are the differences between
a resource-centric and user-centric models of access management?
Why is a resource-centric model more flexible? How does a resource-centric
model support user groups or roles?
Federated Identity
Management. Why federated organizations require different
authentication and identity management solutions? How a common credential
and delegated administration allows federated businesses to independently
control access to their resources without relying on third party
authoritative sources?
Comparing the Sevan
WSA and SSL VPNs. What are the differences and similarities
between SSL VPNs and the Sevan WSA? What features and technologies
make them different? What problem does each solve?
Unintended
Consequences of SSL VPNs. How do SSL VPNs limit your
ability to use SSL for application security? How do they prevent
end-to-end certificate-based authentication of remote users?
How the Sevan
WSA Addresses HIPAA. What technical safeguards and
security measures are provided by the Sevan WSA for addressing the
requirements of HIPAA in the health care industry?
ASP
and BPO Authentication Issues. What are the key security
issues facing Application Service Providers and Business Process
Outsourcers? How does the choice of user authentication methods
address these issues?
Customer
Authentication for Small/Medium Banks. How can a Sevan
WSA make the customer banking experience more personal, increase
customer satisfaction, and improve customer retention?
|