Skip to main content

White Papers

arrowFrequently Asked Questions
arrowMobile Access and Byod
  • Secure Architecture for Mobile Device Access to On-Premise Applications:
    This document introduces a technical architecture that enables applications installed on mobile phones and similar devices to access security-sensitive applications deployed inside a private corporate network perimeter. The mobile devices may be personal (i.e., "BYOD") or corporate owned/managed, but it is assumed that they are neither wirelessly attached to the corporate network nor necessarily able to establish a virtual private network (VPN) link.
arrowPassword Management Basics
  • Choosing Good Passwords:
    A plain-language guide, suitable for sharing with end users, to security threats posed by password cracking software and how to apply good password rules to prevent security compromises.
  • Password Reset for Locked Out Users:
    An objective comparison of alternate strategies to addressing the problem of helping users that forgot their initial network login password.
  • Defining Enterprise Identity Management:
    Identity management is a much used term that refers to a set of technologies intended to manage a basic problem: information about the identity of employees, contractors, customers, partners, customers and vendors is distributed among too many systems, and is consequently difficult to manage. This document defines the components of enterprise identity management technologies. It describes the underlying business problem of managing user identity information on a variety of systems. It then defines identity management in the context of this problem, and describes technologies used to manage user identities effectively in the enterprise.
arrowPassword Management Best Practices
arrowPassword Manager Product Literature
  • Color Brochure:
    One page glossy product brochure for Password Manager.
  • Large Scale Password Management with Password Manager:
    Password Manager provides automation and self-service, to help users better manage their corporate credentials. With Password Manager, users can more conveniently and securely manage their credentials, which lowers IT support cost, improves user productivity and strengthens corporate security. The core concept is to help users manage all of their credentials -- network and local passwords, filesystem encryption passwords, one time password tokens, smart cards, certificates, biometrics and more -- using a single system.
  • Password Manager Features at a Glance:
    A brief overview of Hitachi ID Password Manager features.
  • Building a Business Case for Hitachi ID Password Manager Purchase and Deployment:
    Sample business case for justifying purchase and deployment of Password Manager.
  • Selecting a Password Management Product:
    Advice to prospective buyers of a password management system as to what features, services and vendor characteristics to look for, in order to maximize the chances for a successful project outcome.
  • Password Manager Competitive Advantages:
    There are many password management products on the market. Password Manager is the market leader because of superior technology, lower TCO and higher ROI.
arrowSpecial cases and advanced topics
  • Locking Down a Password Manager Server:
    It is important to protect both the Password Manager server and the data it stores. This document describes how.
  • Managing Passwords for Mobile Users:
    Managing passwords for mobile users is more challenging than managing passwords to network-attached users. Challenges include managing local passwords on thousands of workstations, coping with cached credentials and supporting mobile users who forgot their initial workstation sign-on password.
  • Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Internet Service Provider:
    As ISPs scale to hundreds of thousands and millions of end customers, the cost to support repetitive problems such as password resets rises to significant levels, reaching millions of dollars annually. This document describes password management specifically for ISPs.
  • Password Manager Security Analysis:
    Password Manager impacts authentication processes and standards. This document describes this impact, and how to ensure that it is a positive change. Password Manager is also a sensitive part of an organizations IT infrastructure, and consequently must be defended by strong security measures. The technology used by Password Manager to protect against intrusions, as well as best practices to deploy that technology, are described here.
  • Migrating application users and passwords with Password Manager:
    This document describes a number of ways in which Password Manager can be used to ease migrations from one system or directory to another.
  • Password Manager Telephony Integration:
    This document outlines how Password Manager can be integrated with an interactive voice response (IVR) system, to enable self-service password reset from a telephone, self-service token management from a telephone and active enrollment of biometric voice print samples.
  • Managing Lotus Notes ID File Passwords Using Password Manager:
    Managing Lotus Notes ID file passwords presents some unique and complex challenges. This document provides an overview of these challenges, and the various ways in which they can be addressed using Password Manager.
page top page top