Home page logo

pen-test logo Penetration Testing mailing list archives

Hardware/software secureIDs - pros and cons.
From: eladexposed () gmail com
Date: 28 Jun 2007 13:26:40 -0000

What are the pros and cons for using hardware RSA SecureID/Other and software with the same characteristics? 

For example:

Let's say there's a company that allow only customers using the hardware SecureID to connect its resources - 
What might be the main arguments the company has to prefer the hardware and not the software? 
From the customer's point of view it's better to have software installed (management, holding of multiple tokens, user 
usage etc)
Kind Regards,
Elad Shapira ("Zest")

"Security, however, is an art, not a science." - RFC 3631

This List Sponsored by: Cenzic

Swap Out your SPI or Watchfire app sec solution for
Cenzic's robust, accurate risk assessment and management
solution FREE - limited Time Offer


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]