Thursday, 23 February 2006 00:00
Written by Brian Bakker
Identity management, which, broadly speaking, governs user access to corporate IT systems, is not enough by itself. Strong authentication is required to protect IT systems, but risk mitigation should be weighed against cost.