IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
AuthenticationWhite Papers (View All Report Types)
101 - 125 of 260 Matches Previous Page  | Next Page
Third-Party Add-Ons Needed to Bridge the Gap with SharePoint
sponsored by Kodak
WHITE PAPER: While SharePoint is a successful collaboration solution, it is not an all-encompassing ECM strategy. This whitepaper explores how third-party add-on solutions can help you expand your SharePoint framework to enhance productivity and efficiency in your organization.
Posted: 27 Dec 2012 | Published: 21 Dec 2012

Kodak

Delivering Enterprise Information Securely on Android and Apple iOS Devices
sponsored by Citrix
WHITE PAPER: This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control.
Posted: 16 Oct 2012 | Published: 30 Apr 2012

Citrix

Controlling Laptop and Smartphone Access to Corporate Networks
sponsored by Dell Software
WHITE PAPER: Mobile devices are conduits of greater access and information, but can serve as a vehicle for malware and other security threats. Find out how your IT department can enable secure access for mobile devices and laptops to ensure network integrity and security.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Dell Software

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

Intelligent Authentication and User Access: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This informative white paper outlines today's rapidly changing security landscape,  and offers an overview of the latest identity and access security strategies so that your organization can stay safe - click through to learn more.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

CA Technologies.

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments
sponsored by Centrify Corporation
WHITE PAPER: This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities.
Posted: 20 Sep 2012 | Published: 20 Sep 2012

Centrify Corporation

Securely Enable Online Business
sponsored by CA Technologies.
WHITE PAPER: Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

SharePoint Security in Action: Best Practices Drive Secure Collaboration
sponsored by CA Technologies.
WHITE PAPER: Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

The Consumerization of IT: Security Challenges of the New World Order
sponsored by CA Technologies.
WHITE PAPER: Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.
Posted: 22 Aug 2012 | Published: 31 May 2012

CA Technologies.

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

The Expanding Network Perimeter: How to Protect it With Unified Threat Management
sponsored by Sophos, Inc.
WHITE PAPER: Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Sophos, Inc.

Cloud Encryption Gateway: Overcoming Cloud Security and Compliance Concerns
sponsored by CipherCloud
WHITE PAPER: Learn how CipherCloud protects data in Salesforce, Gmail, and Office 365. Find out how the solution sits between your users and your cloud applications and applies AES-256 encryption on the fly before sensitive data leaves the enterprise to provide protection without requiring changes to the cloud application or impacting application functionality.
Posted: 09 Aug 2012 | Published: 09 Aug 2012

CipherCloud

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
sponsored by Cisco
WHITE PAPER: Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
Posted: 24 Jul 2012 | Published: 30 Jun 2011

Cisco

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

Securing your Online Data Transfer with SSL
sponsored by Thawte Inc.
WHITE PAPER: This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Thawte Inc.

Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate
sponsored by Thawte Inc.
WHITE PAPER: This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Thawte Inc.

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Enabling High Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER: Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
Posted: 30 May 2012 | Published: 20 Sep 2011

Aruba Networks

The Threat Within: The Case for Zero Trust Access Control
sponsored by Xceedium
WHITE PAPER: It's important to remember that threats are not only external; the most dangerous ones can be the privileged insiders who have access to critical systems. This paper explores the risks associated with privileged insiders and how to mitigate them with Zero Trust access control. Uncover the 8 key capabilities for an effective approach now.
Posted: 22 May 2012 | Published: 22 May 2012

Xceedium
101 - 125 of 260 Matches Previous Page    3 4 5 6 7 8    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement