Wednesday, May 11, 2005

Digital ID World 2005 Part 1

To preface, these posts will not be in chronological order as my notes are not completely gathered yet. However, I've been listening to several vendor presentations and I'm begining to think that VPNs will add and combine strong authentication mechanisms with mal-ware detection software to protect employee access to network systems. How would this work? Here is my take.


First off, a USB device would have a required token in order to access the device (so if plugged in, no access would occur until the device was unlocked. Once unlocked, the device would scan the system for any mal-ware or other intrusion methods to ensure nothing can be captured. The next step is to contain the VPN software required to access your private network. Once this software was located and the user is authenticated, the device is required to be removed from the system (to prevent users from leaving the device in a single system or random system.


Other additions would be related to work systems that already have the vpn software and scanning software which would speed up the authentication process. That way the typical login time would not be as intense as it would be given a random system that an employee attempts to use. After all, do you know what exists on your neighbors computer?

No comments: