IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
Authentication White Papers (View All Report Types)
201 - 225 of 254 Matches Previous Page  |  Next Page
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

Making the FACTA Red Flags Rules Operational
sponsored by RSA
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

Workday Security: An Application Perspective
sponsored by Workday
WHITE PAPER: Read this white paper to learn about the innovative security features of Workday products, which focus on user authentication, authorization, and validation.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Workday

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Wireless Networking: Five Questions to Start With
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

10 Things IT Should Be Doing (but isn't)
sponsored by Varonis
WHITE PAPER: Check out this brief paper to learn the ten must-do actions for maximizing unstructured data protection.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

Sun xVM Virtualization Portfolio: Virtualizing the Dynamic Datacenter
sponsored by Sun Microsystems, Inc.
WHITE PAPER: This paper summarizes the benefits and challenges of traditional virtualization strategies, the advantages of Sun's approach, and the core capabilities of the Sun xVM portfolio.
Posted: 08 Sep 2008 | Published: 08 Sep 2008

Sun Microsystems, Inc.

Converged Video Network Security
sponsored by Alcatel-Lucent
WHITE PAPER: Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself.
Posted: 20 Aug 2008 | Published: 01 Apr 2007

Alcatel-Lucent

Best Practices for BlackBerry Administrators
sponsored by BlackBerry
WHITE PAPER: This whitepaper discusses best practices for managing your BlackBerry Enterprise Server running on Lotus Domino. Take a tour of the administrative features and tools that can make your job easier. This session is a must for any BlackBerry administrator.
Posted: 18 Aug 2008 | Published: 18 Aug 2008

BlackBerry

Managing and Monitoring a Primary Wireless Network
sponsored by Intel Corporation
WHITE PAPER: Intel IT designed a highly automated approach to managing an enterprise primary wireless LAN, with a focus on service level management and monitoring. This white paper has the details.
Posted: 12 Aug 2008 | Published: 01 Feb 2007

Intel Corporation

Effective Security with a Continuous Approach to ISO 27001 Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Tripwire, Inc.

ESG: A Phased Approach to Network Access Control (NAC)
sponsored by Symantec Corporation
WHITE PAPER: Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Strong Authentication: Securing Identities and Enabling Business
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs.
Posted: 08 Jul 2008 | Published: 01 Jul 2008

Aladdin Knowledge Systems

End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control
sponsored by Sun Microsystems, Inc.
WHITE PAPER: This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack.
Posted: 03 Jul 2008 | Published: 01 Jun 2008

Sun Microsystems, Inc.

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs
sponsored by NetMotion Wireless
WHITE PAPER: This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE.
Posted: 27 Jun 2008 | Published: 01 Jun 2008

NetMotion Wireless

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

Citrix GoToMyPCCorporate - Security White Paper
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
Posted: 19 Jun 2008 | Published: 01 Jan 2006

Citrix Online - GotoMyPC

SAP Netweaver: Streamlining the Transition to Services-Based IT Security
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
Posted: 18 Jun 2008 | Published: 01 Feb 2006

SAP America, Inc.

The Evolution of Password Authentication and Management: A Simple Solution
sponsored by PistolStar, Inc.
WHITE PAPER: This paper delves into the world of password authentication and management, as passwords serve a very significant purpose, they have not been without their own set of issues and obstacles for organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

America's Quest for IPv6 - Part II: An Analysis of the Business and Financial Metrics of the Coming IPv6 Marketplace
sponsored by Command Information
WHITE PAPER: the transition to IPv6 is very much on its way to becoming a viable, profitable market. This white paper this conclusion with some attention grabbing highlights...
Posted: 09 Jun 2008 | Published: 09 Jun 2008

Command Information

America's Quest for IPv6 - Part I: A Business Perspective
sponsored by Command Information
WHITE PAPER: This paper emphasizes that American organizations must adopt IPv6 today and describes the features and functions that will keep them competitive on the global stage.
Posted: 09 Jun 2008 | Published: 09 Jun 2008

Command Information

Preparing the WLAN for Voice Communications WP
sponsored by Avaya Inc.
WHITE PAPER: Companies at the cutting edge are finding it takes planning to implement effectively and that some of their assumptions about the current state of their wireless.
Posted: 09 Jun 2008 | Published: 01 May 2005

Avaya Inc.
201 - 225 of 254 Matches Previous Page    7 8 9 10 11    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement