IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 
Definition continues below.
Authentication White Papers (View All Report Types)
26 - 50 of 303 Matches Previous Page  |  Next Page
Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

Continuous Monitoring and Threat Mitigation with Next-Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, discover how to transform your disparate security technology silos into a more unified and automated system that continuously monitors and mitigates threats with next-generation NAC. Read on to learn how to enable BYOD adoption and support IT-GRC framework specifications.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ForeScout Technologies, Inc.

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: With the current shift toward mobility becoming the business norm, security needs to be your top priority. Discover how to protect BYOD workflows and deliver secure enterprise-class mobility by utilizing a user and device authentication software. Read on to learn about mobile security best practices.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Flipping the Script: Law Firms Hunted by Cybercriminals
sponsored by SurfWatch Labs
WHITE PAPER: This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

SurfWatch Labs

SaaS Safety and Security: Taming the Office Password Monster
sponsored by Dashlane Inc.
WHITE PAPER: Learn if you're leaving the door open for hackers in this white paper as it shines a light on the many password management blunders. Discover how to keep login simple for your users without creating undue risk.
Posted: 24 Dec 2015 | Published: 23 Dec 2015

Dashlane Inc.

Social Networking: 5 Risks of Team Login Sharing
sponsored by Dashlane Inc.
WHITE PAPER: Discover the 5 risks of team social networking login sharing and how to secure an always-on culture to connect with customers.
Posted: 17 Dec 2015 | Published: 09 Dec 2015

Dashlane Inc.

Password Hacking: Are You Safer in the Cloud?
sponsored by Dashlane Inc.
WHITE PAPER: This white paper teaches you how to secure your password management strategy in the cloud in 3 simple steps. Continue reading to learn why you need to kill simple password rules and how to adapt to cloud authentication and access.
Posted: 15 Dec 2015 | Published: 08 Dec 2015

Dashlane Inc.

How to Integrate Siloed Identities and Data
sponsored by Radiant Logic, Inc.
WHITE PAPER: This comprehensive white paper digs into the current fragmented landscape of identity infrastructures. Read on for expert tips on integrating identities and data out of silos.
Posted: 14 Dec 2015 | Published: 31 Dec 2012

Radiant Logic, Inc.

The Curious Case of API Security: Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This resource delves into the top threats facing APIs, exploring how these attacks are carried out and how you can thwart them. Read on to learn how to keep your APIs secure.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Axway

Better IAM Means a Better Experience
sponsored by Dashlane Inc.
WHITE PAPER: Could SSO be the key to blocking credential and identity theft? In this white paper, learn about next-gen IAM approaches to mitigate credential theft.
Posted: 25 Nov 2015 | Published: 18 Nov 2015

Dashlane Inc.

The Economics of Digital Identity
sponsored by Oracle Corporation
WHITE PAPER: In this report, learn more about digital identities, the challenges organizations are facing, and strategies to clear those hurdles.
Posted: 30 Oct 2015 | Published: 01 Oct 2015

Oracle Corporation

IAM for Web Resources and APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper teaches you how to harness open standards like SAML to enable secure web SSO, protect APIs, and provide dynamic session management to employees.
Posted: 28 Oct 2015 | Published: 17 Jun 2015

Ping Identity Corporation

Strategies for Web and API Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, you'll learn about next-gen identity standards and requirements and how to secure access to apps - regardless of their environment.
Posted: 27 Oct 2015 | Published: 14 Jul 2014

Ping Identity Corporation

The Essential OAuth Primer - Understanding OAuth for Securing Cloud APIs
sponsored by Ping Identity Corporation
WHITE PAPER: In order to create a consistent, flexible identity and policy architecture for web apps, services, devices, and desktop clients attempting to communicate with cloud APIs, you need to eliminate the password anti-pattern. This white paper explores one such approach in depth - view now to learn if it lives up to its promises.
Posted: 26 Oct 2015 | Published: 14 May 2014

Ping Identity Corporation

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

Higher Education: How to Comply with Network Security Legislation
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a way for higher education institutions to comply with IT security regulations and protect students and staff from harmful content by consolidating multiple security services into a single, high performance device that cuts equipment, administration, and management costs.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.
26 - 50 of 303 Matches Previous Page    1 2 3 4 5    Next Page
 
AUTHENTICATION DEFINITION (continued): …  to gain access for legitimate purposes. Mutual authentication is gaining acceptance as a tool that can minimize the risk of online fraud in e-commerce.With mutual authentication, a connection can occur only when the client trusts the server's digital certificate and the server trusts the client's certificate. The exchange of certificates is carried out by means of the Transport Layer Security (TLS) protocol. If the client's keystore contains more than one certificate, the certificate with the latest timestamp is used to authenticate the client to the server. This process reduces the risk that … 
Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement