IT Management  >   Systems Operations  >   Security  >   AAA  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 
Definition continues below.
Authentication White Papers (View All Report Types)
1 - 25 of 274 Matches Previous Page  |  Next Page
Best Practices For Multi-Factor Authentication
sponsored by Synchronoss
WHITE PAPER: Learn how multi-factor authentication bolsters security and is exponentially more secure than passwords alone. Discover the fundamental problem with relying on passwords, how to choose a cloud service that meets your industry's guidelines, and more.
Posted: 25 Oct 2016 | Published: 25 Oct 2016


Information Security Reference Guide
sponsored by Navex Global
WHITE PAPER: This guide can help any organization struggling with data protection policies put solid guidelines in place for employees to follow. Based on ISO and the International Electrotechnical Commission (EC) standards, it lays out a definite structure for information security, access control and compliance among many other critical areas.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Navex Global

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Improve Your Security Posture: 10 Reports you Need to Run Today, and Every Day
sponsored by Dell Software
WHITE PAPER: Uncover the top 10 security reports designed provide vigilance for a reduced attack surface and improve authentication and authorization. Learn why it's time to investigate stale user accounts, expired passwords, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

MYDIGIPASS for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover a unified identity proofing method and authentication tool that can be used throughout all healthcare IT applications and platforms. Access now to learn the five critical elements to support trusted digital identities and secure information exchange within healthcare organizations and HIT providers.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

How to Balance Security and Convenience in Authentication
sponsored by VASCO Data Security International
WHITE PAPER: Discover a convenient single-button authentication device that boosts security while providing easy user experience. Learn how you can economically deploy a comprehensive, scalable, high performance two-factor authentication solution for secure network/remote access.
Posted: 30 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

Designing a Multilayered, In-Depth Defense Approach to Authentication
sponsored by Dell Software
WHITE PAPER: This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Read on to uncover features you should look for in third-party solutions to supplement native security mechanisms.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Why Code Signing Is an Essential Website Security Feature
sponsored by Symantec
WHITE PAPER: Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 28 Sep 2016


Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016


Are You Fully Secure? Or Are You Using Weak Authentication Methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using authentication to improve secure access and protect valuable data.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Minimizing the Identity Attack Vector with Continuous Authentication
sponsored by RSA Softcat
WHITE PAPER: Learn how continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

Six Steps to Controlling the Uncontrollable
sponsored by Microsoft
WHITE PAPER: With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.
Posted: 18 May 2016 | Published: 01 Apr 2016


Controlling Data Center Security
sponsored by Barracuda Networks
WHITE PAPER: Learn how you can strengthen your data center perimeter firewall protection while enabling flexibility to allow for change in the future. Discover how to centrally control your data center security system to prevent it from weakening over time.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015


How IT Leaders Are Innovating with Customer Identity Management
sponsored by Gigya
WHITE PAPER: With IT budgets limited, enterprises often struggle to secure funds for innovations that enable crucial relationships with customers. Access this white paper that explains how a separate customer identity management layer can help you attract customers while maximizing budget and ROI.
Posted: 14 Apr 2016 | Published: 14 Apr 2016


Improve User Acquisition with Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.
Posted: 14 Apr 2016 | Published: 31 Dec 2015


Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015


Leverage Accurate and Current Customer Data with Social Login
sponsored by Gigya
WHITE PAPER: To offer targeted promotions, it's crucial to gain a comprehensive and current view of the customer. Discover a customer identity management platform that offers social media login, allowing users to quickly and easily register and empowering you to access the most up-to-date and accurate customer data.
Posted: 21 Mar 2016 | Published: 16 Sep 2015


Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 274 Matches Previous Page    1 2 3 4    Next Page
AUTHENTICATION DEFINITION (continued): …  to gain access for legitimate purposes. Mutual authentication is gaining acceptance as a tool that can minimize the risk of online fraud in e-commerce.With mutual authentication, a connection can occur only when the client trusts the server's digital certificate and the server trusts the client's certificate. The exchange of certificates is carried out by means of the Transport Layer Security (TLS) protocol. If the client's keystore contains more than one certificate, the certificate with the latest timestamp is used to authenticate the client to the server. This process reduces the risk that … 
Authentication definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement