IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
Authentication White Papers (View All Report Types)
1 - 25 of 269 Matches Previous Page  |  Next Page
Preventing Insider Cyber Attacks
sponsored by IBM
WHITE PAPER: Access this white paper to learn how one identity and access management platform enables you to view all user activity and mitigate internal and external breach risk.
Posted: 27 Feb 2015 | Published: 17 Sep 2014

IBM

Taking Control of the Digital and Mobile User Authentication Challenge
sponsored by RSA
WHITE PAPER: In this white paper, view the strategies and policies available to managing user authorization and access to reduce risk and protect yourself from cyber-attacks. Read on to see how others have taken advantage of these strategies in several case studies.
Posted: 27 Feb 2015 | Published: 07 Jan 2015

RSA

IAM Buyers Guide: How to Evaluate and Choose the Right Platform
sponsored by IBM
WHITE PAPER: Access this resource and explore the IAM buyer's guide.  Discover how to evaluate and choose a solution to protect your organization's data
Posted: 25 Feb 2015 | Published: 11 Jun 2014

IBM

Old Techniques in a New Channel: The Evolving Threats of Mobile Banking
sponsored by IBM
WHITE PAPER: This white paper describes in detail the attacks mobile banking users face.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

IBM

Signed, Sealed, Delivered: Integrating Electronic Signatures Into the B2B Sales Cycle
sponsored by Adobe EchoSign
WHITE PAPER: Many companies are still behind the curve when it comes to generating and processing sales contracts. Many still fax and physically sign documents - are e-signatures a graceful (and legal) solution?This white paper discusses the advantages of e-signatures, and how you can integrate them into the sales process successfully.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

How IT Can Help Businesses Streamline Vendor/Supplier Contracts Processes
sponsored by Adobe EchoSign
WHITE PAPER: This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

ESIGN Act A Well-Established Law Enabling Business Transformation Today
sponsored by Adobe EchoSign
WHITE PAPER: This paper discusses several factors relating to the legality of e-signatures in various applications and among different industries, with their associated regulatory environments.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Case Study: Public School Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: This case study details how the Grand Island school district in Nebraska implemented the Centrify for Mac and Mobile solution for integration into a centralized IAM framework to handle authorization and authentication district-wide.
Posted: 04 Feb 2015 | Published: 30 Aug 2013

Centrify Corporation

Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
sponsored by Ping Identity Corporation
WHITE PAPER: Ping Identity is working hard to deliver what they believe to be the best solutions for securing and streamlining identity management for business-critical applications, especially those in the cloud.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

Ping Identity Corporation

Identity is the Center of Always-On Connectivity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper examines the advantages organizations stand to gain by using an identity and access management platform to federate access control across all applications and create a centralized view of all your users' information, allowing you to dramatically improve your customer experience.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

eBook: How Customer Experience Impacts Your Identity and Access Management Practices
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses how customer experience influences IAM and security and examines the actions you can take to deliver secure, seamless experience for your customers.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

An Executive Buyers' Guide to Identity and Access Management Solutions
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper examines some of the most important trends security managers need to be aware of and discusses the questions you need to ask when evaluating and possibly reforming your security strategy.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

SAML Identity Federation: Security for an Increasingly Connected World
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language - SAML. It describes why standards like SAML are necessary for implementing federated identity across organizations.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

The CIO's Guide to Modern Identity Management
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper explores five key trends impacting CIOs and security management today, and discusses how focusing on authenticating user identity versus protecting the endpoint can help companies successfully overcome the security challenges presented by these key trends.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

To Increase Downloads, Instill Trust First
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Security Throughout the File Transfer Life-Cycle: A Managed File Transfer Imperative
sponsored by Ipswitch File Transfer
WHITE PAPER: Check out this informative white paper that highlights a new approach to secure your file transfers, and details the specific features included in a MFT system.
Posted: 16 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this shortcut guide, readers will learn how changes in the way we deliver services, the increasing use of mobile devices, the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave web applications vulnerable to attack.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Grow Business Consumer Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.
Posted: 12 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing Microsoft Exchange 2010 with Symantec™ SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This guide will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 12 Jan 2015 | Published: 02 Jul 2014

Symantec Corporation

Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM
1 - 25 of 269 Matches Previous Page    1 2 3 4    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement