Research into Authentication 2015
Jinfo Report
27th August 2015
Abstract
Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In this report we present FreePint's research results into authentication, including the research methodology, respondents... and the factors which make authentication such a unique challenge.
Grappling with less-than-perfect authentication methods is a challenge for information managers across industries, with some sectors placing greater importance than others on drivers such as a single view of usage or access to resources for partners and affiliates. The research also looked at varying approaches, priorities and plans around authentication.
Finally we examined how information managers can grapple with the complex set of requirements required to solve the challenges of authentication. It's critical to have a strategy for gathering information, as well as reliable sources of that information. The research also uncovered those sources of information as well as soliciting free-form comments on technologies from SSO to IP authentication, the role of senior leadership and a host of other issues.
Includes the following chapters:
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this report is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Report title: Research into Authentication 2015
- Pages: 21
- Link to this page
- View printable version
- Options for Authentication - Which Approach Does What?
Tuesday, 24th November 2015 - Considerations and Lessons Learnt from Developing a Virtual Information Centre
Monday, 23rd November 2015 - Information Buyers and Sellers Striving for Mutual Understanding
Wednesday, 18th November 2015 - Q&A with Priory Solutions - ResearchMonitor for Resource Management
Friday, 16th October 2015 - Results from FreePint Research into Authentication, Part 3 - What's Needed
Tuesday, 25th August 2015 - Results from FreePint Research into Authentication, Part 2 - Approaches and Priorities
Monday, 24th August 2015 - Results from FreePint Research into Authentication, Part 1 - Background and Methodology
Thursday, 20th August 2015