Robin Neidorf Results from FreePint Research into Authentication, Part 2 - Approaches and Priorities
Jinfo Article

24th August 2015

By Robin Neidorf

Abstract

Information managers in many industries are grappling with less-than-perfect authentication methods, with some industries placing greater importance than others on drivers such as a single view of usage or access to resources for partners and affiliates. Read the analysis of findings from FreePint's research into approaches, priorities and plans in the second installment of our feedback on this exciting fresh research.

Content Access

Access to Jinfo Content and Community is available through a Jinfo Subscription.

Does your organisation have a Jinfo Subscription?
"Yes"

Please sign in to MyJinfo here so that we can check your access to this item:

Email:

Password:

  Forgotten password?


Or sign in via email:

Enter your email and we'll send you a magic link to sign you in automatically.

"Not yet"

Access to this article is available through a Jinfo Subscription, which will help your organisation:

  1. Save time and money
  2. Re-invent information services
  3. Define, measure and communicate information value.

Subscribe


"Don't know"

Contact us to find out if your organisation already has a Jinfo Subscription.

Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.



 « All Articles