IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
AuthenticationWhite Papers (View All Report Types)
201 - 225 of 262 Matches Previous Page  | Next Page
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Protecting CPNI - Top Four Tips for a Successful Security Program Deployment
sponsored by RSA, The Security Division of EMC
WHITE PAPER: With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

RSA, The Security Division of EMC

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises
sponsored by Global Knowledge
WHITE PAPER: This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER: A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

VeriSign® Identity Protection Fraud Detection Service
sponsored by VeriSign EMEA
WHITE PAPER: This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

How to Extend your Virtual Private Network with Citrix GoToMyPC Corporate
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: Read this white paper to learn how companies can deliver more effective remote access by augmenting their traditional VPN with Web-based technologies.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Citrix Online - GotoMyPC

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

Making the FACTA Red Flags Rules Operational
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC

Workday Security: An Application Perspective
sponsored by Workday
WHITE PAPER: Read this white paper to learn about the innovative security features of Workday products, which focus on user authentication, authorization, and validation.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Workday

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Wireless Networking: Five Questions to Start With
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

10 Things IT Should Be Doing (but isn't)
sponsored by Varonis
WHITE PAPER: Check out this brief paper to learn the ten must-do actions for maximizing unstructured data protection.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

Sun xVM Virtualization Portfolio: Virtualizing the Dynamic Datacenter
sponsored by Sun Microsystems, Inc.
WHITE PAPER: This paper summarizes the benefits and challenges of traditional virtualization strategies, the advantages of Sun's approach, and the core capabilities of the Sun xVM portfolio.
Posted: 08 Sep 2008 | Published: 08 Sep 2008

Sun Microsystems, Inc.

Converged Video Network Security
sponsored by Alcatel-Lucent
WHITE PAPER: Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself.
Posted: 20 Aug 2008 | Published: 01 Apr 2007

Alcatel-Lucent

Best Practices for BlackBerry Administrators
sponsored by BlackBerry
WHITE PAPER: This whitepaper discusses best practices for managing your BlackBerry Enterprise Server running on Lotus Domino. Take a tour of the administrative features and tools that can make your job easier. This session is a must for any BlackBerry administrator.
Posted: 18 Aug 2008 | Published: 18 Aug 2008

BlackBerry

Managing and Monitoring a Primary Wireless Network
sponsored by Intel Corporation
WHITE PAPER: Intel IT designed a highly automated approach to managing an enterprise primary wireless LAN, with a focus on service level management and monitoring. This white paper has the details.
Posted: 12 Aug 2008 | Published: 01 Feb 2007

Intel Corporation

Effective Security with a Continuous Approach to ISO 27001 Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Tripwire, Inc.

ESG: A Phased Approach to Network Access Control (NAC)
sponsored by Symantec Corporation
WHITE PAPER: Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Strong Authentication: Securing Identities and Enabling Business
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs.
Posted: 08 Jul 2008 | Published: 01 Jul 2008

Aladdin Knowledge Systems

End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control
sponsored by Sun Microsystems, Inc.
WHITE PAPER: This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack.
Posted: 03 Jul 2008 | Published: 01 Jun 2008

Sun Microsystems, Inc.

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs
sponsored by NetMotion Wireless
WHITE PAPER: This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE.
Posted: 27 Jun 2008 | Published: 01 Jun 2008

NetMotion Wireless
201 - 225 of 262 Matches Previous Page    7 8 9 10 11    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement