Penetration Testing mailing list archives
Re: Hardware/software secureIDs - pros and cons.
From: AdityaK <aditya1010 () gmail com>
Date: Fri, 29 Jun 2007 21:52:38 +0530
Hi Pros of Using a Hardware Token: -Extracting shared key through reverse engg is not as easy and involves higher cost compared to soft tokens. -Works on different OS,Environments and no headache of downlaoding ,reinstalling. -Operating life is higher for hardware token -If tied well with CAP/DAP can be used for different services Regards Aditya.K Researcher On 28 Jun 2007 13:26:40 -0000, eladexposed () gmail com <eladexposed () gmail com> wrote:
Hello, What are the pros and cons for using hardware RSA SecureID/Other and software with the same characteristics? For example: http://www.rsa.com/node.aspx?id=1313 Let's say there's a company that allow only customers using the hardware SecureID to connect its resources - What might be the main arguments the company has to prefer the hardware and not the software? From the customer's point of view it's better to have software installed (management, holding of multiple tokens, user usage etc) Kind Regards, Elad Shapira ("Zest") "Security, however, is an art, not a science." - RFC 3631 ------------------------------------------------------------------------ This List Sponsored by: Cenzic Swap Out your SPI or Watchfire app sec solution for Cenzic's robust, accurate risk assessment and management solution FREE - limited Time Offer http://www.cenzic.com/wf-spi ------------------------------------------------------------------------
------------------------------------------------------------------------ This List Sponsored by: Cenzic Swap Out your SPI or Watchfire app sec solution for Cenzic's robust, accurate risk assessment and management solution FREE - limited Time Offer http://www.cenzic.com/wf-spi ------------------------------------------------------------------------
Current thread:
- Hardware/software secureIDs - pros and cons. eladexposed (Jun 28)
- Re: Hardware/software secureIDs - pros and cons. AdityaK (Jun 29)
- Re: Hardware/software secureIDs - pros and cons. Carl-Johan Bostorp (Jun 29)
- Re: Hardware/software secureIDs - pros and cons. Sam Rakowski (Jun 29)
- RE: Hardware/software secureIDs - pros and cons. Levenglick, Jeff (Jun 29)
- <Possible follow-ups>
- RE: Hardware/software secureIDs - pros and cons. David M. Zendzian (Jun 29)