Decide on the Validity of Each Vendor s Solution

 <  Day Day Up  >  

Decide on the Validity of Each Vendor's Solution

Martin looked at his survey results. Over 85% of his participants liked the technology and felt that it should proceed into a pilot. On top of that, there was an overwhelming 95% response rate to the survey. This indicated to Martin that this technology was fitting a very pressing need. Martin used the survey, his own experience, and the behavior of the vendors to make his selection.

Jason knew he had to get moving; the clock was ticking. He decided that the vendor was one he could work with and the solution did work pretty well for digital certificates. He assumed that it should work as well for other Windows-based passwords, and he hoped he was right, as he had very little time to try those features out.


The Methodology

Based on the documentation from the POC wrap-up , each vendor's product can be evaluated in light of the goals and success criteria. However, the vendor that met the most success criteria is not always the one selected. Often during the POC, one success criterion stands out as more important than the others. This could become a key in selecting the final product. Also, other intangibles like support and teamwork need to be considered in the decision. Once the decisions are made for each vendor, the next step can be taken.

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net