Results from FreePint Research into Authentication, Part 3 - What's Needed
Jinfo Article
25th August 2015
Abstract
How can information managers grapple with the complex set of requirements required to solve the challenges of authentication? It's critical to have a strategy for gathering of information, as well as reliable sources of that information. The third installment of analysis of findings from FreePint's research looks as those sources of information as well as free-form comments on technologies from SSO to IP authentication, plus the role of senior leadership and a host of other issues.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Results from FreePint Research into Authentication, Part 3 - What's Needed
- Link to this page
- View printable version
- Results from FreePint Research into Authentication, Part 2 - Approaches and Priorities
Monday, 24th August 2015 - Results from FreePint Research into Authentication, Part 1 - Background and Methodology
Thursday, 20th August 2015
- All About Usage - from Authentication to Licensing
Tuesday, 4th August 2015 - FreePint for Biopharma
Wednesday, 8th July 2015 - The Mysteries and Challenges of Authentication
Wednesday, 1st July 2015
- Research into Authentication 2015
Thursday, 27th August 2015