Sevan Networks Logo Identity Authentication for Web Security
home solutions products white papers about us

White Papers

These white papers are offered to provide you with a deeper understanding of the philosophy and technologies behind the WSA. They are in Adobe's PDF format.

Passwords and Subscriber Services. What are subscriber services and why are they important to business? How are passwords used today? What are the problems and costs with passwords?

Comparing Web Authentication Methods. What are the commonly used methods for web user authentication? How do they compare?

Phishing Passwords. Why are passwords vulnerable to phishing attacks? How does the Sevan WSA neutralize phishing for authentication passwords?

Authenticating the Person. What are the differences between certificate-based authentication and other forms of authentication? Does any method actually authenticate an individual person? Why is certificate-based authentication secure?

Identity Authentication™. What are subscriber services? How does Identity Authentication™ work? How is it different from password solutions?

Common Credentials. How Sevan's certificate-based authentication simplifies single sign-on and federated authentication.

User Authentication with Public Key Cryptography. What is Public Key Cryptography? How is it used to authenticate users on the Web? Why is it better than password systems?

Storing and Protecting Certificates. What are the pros and cons of storing certificates in browsers, smart cards, and tokens?

Security Benefits of the Sevan WSA. How does the WSA protect the servers and the users? What are the other security features besides Identity Authentication™?

Sevan WSA Network Configurations. How does the WSA co-exist with firewalls, load balancers, and other networking devices?

Sevan WSA in Directory-Driven Enterprises. How does the Sevan WSA work with LDAP Directories to serve as an enforcement point for web content and applications?

Resource-Centric Access Management. What are the differences between a resource-centric and user-centric models of access management? Why is a resource-centric model more flexible? How does a resource-centric model support user groups or roles?

Federated Identity Management. Why federated organizations require different authentication and identity management solutions? How a common credential and delegated administration allows federated businesses to independently control access to their resources without relying on third party authoritative sources?

Comparing the Sevan WSA and SSL VPNs. What are the differences and similarities between SSL VPNs and the Sevan WSA? What features and technologies make them different? What problem does each solve?

Unintended Consequences of SSL VPNs. How do SSL VPNs limit your ability to use SSL for application security? How do they prevent end-to-end certificate-based authentication of remote users?

How the Sevan WSA Addresses HIPAA. What technical safeguards and security measures are provided by the Sevan WSA for addressing the requirements of HIPAA in the health care industry?

ASP and BPO Authentication Issues. What are the key security issues facing Application Service Providers and Business Process Outsourcers? How does the choice of user authentication methods address these issues?

Customer Authentication for Small/Medium Banks. How can a Sevan WSA make the customer banking experience more personal, increase customer satisfaction, and improve customer retention?

Copyright 2002-2009 Sevan Networks, Inc. All Rights Reservedd