IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
Authentication Reports
1 - 25 of 395 Matches Previous Page  |  Next Page
Enabling a Secure and Convenient Online Banking Experience
sponsored by HID
WHITE PAPER: This white paper details how you can increase the security of online banking systems and comply with government mandates.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

HID

Case Study: Decreasing the Risk of Fraud in the Financial Services
sponsored by HID
WHITE PAPER: Read this case study to discover how a financial services institution secured its online banking platform with strong authentication measures.
Posted: 02 Jul 2015 | Published: 25 Mar 2013

HID

Comparing Authentication Security Devices
sponsored by HID
BROCHURE: Access this white paper to explore 10 different authentication devices and learn the strengths and benefits each one adds to your access security strategy. View now to compare these devices to find the ideal authentication approach for your organizations, security, and budget needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2013

HID

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Secure Access between Endpoints and Corporate Resources
sponsored by HID
WHITE PAPER: This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token. Read on to learn how to manage your authentication methods, protect your data, maximize your productivity, and more.
Posted: 30 Jun 2015 | Published: 20 Feb 2013

HID

Simplifying Data at Rest Encryption and Security
sponsored by WinMagic
WEBCAST: This webcast explores full-disk encryption and how it can simplify securing data at rest as well as access management and network security.
Posted: 29 Jun 2015 | Premiered: Jun 10, 2015

WinMagic

Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014

HID

Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Enhancing Authentication to Go Beyond Username and Password Vulnerabilities
sponsored by HID
VIDEO: This brief video explores remote access security challenges and how to go beyond simple username/password combinations to enhance your authentication security strategy.
Posted: 15 Jun 2015 | Premiered: 05 Jun 2013

HID

Utilizing Customer IAM to Better Enable and Protect Your Organization
sponsored by CA Technologies.
WHITE PAPER: This white paper explores customer identity and access management (CIAM) and how to enable and secure multiple channels of customer interaction.
Posted: 15 Jun 2015 | Published: 16 Jul 2014

CA Technologies.

Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Managing and Securing Identities
sponsored by HID
EGUIDE: This expert e-guide presents a simple strategy to assess your IAM strength and offers 9 best practices for establishing effective IAM business rules
Posted: 09 Jun 2015 | Published: 06 May 2015

HID

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 02 Jun 2015 | Published: 08 May 2015

HID

Enabling Mobility without Compromising Security
sponsored by Dell Software
WHITE PAPER: This white paper examines the top 5 mobile security challenges and introduces a model that charts the benefits and risks of various mobile access approaches.
Posted: 29 May 2015 | Published: 20 May 2015

Dell Software

Securing the Mobile Enterprise with 3 New Approaches
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 29 May 2015 | Published: 01 Apr 2015

HID

Secure Mobile Access: Overcoming Today's BYOD Obstacles
sponsored by Dell Software
WHITE PAPER: This white paper examines the need for a holistic security strategy to address the end-to-end mobility and BYOD challenges.
Posted: 28 May 2015 | Published: 19 May 2015

Dell Software

Next Generation Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec Corporation

Cloud Identity Access: Bridging the Gap between IT and Users
sponsored by Symantec Corporation
RESOURCE: Organizations are struggling to secure rogue cloud apps as users work remotely on a myriad of devices.  This white paper presents the challenges of securing cloud apps data and offers insights into facilitating harmony between users and IT.
Posted: 12 May 2015 | Published: 25 Mar 2015

Symantec Corporation

Governance-Driven Provisioning: The Future of Provisioning
sponsored by RSA
WHITE PAPER: This white paper explores the history of provisioning challenges organizations have faced and what the future holds for the technology and network security. View now to learn how a governance-driven approach improves your overall identity and access management (IAM) strategy and avoids the pitfalls of a traditional architecture.
Posted: 08 May 2015 | Published: 29 Apr 2015

RSA

Data Governance Risk: Know Who Has Your Data
sponsored by RSA
RESOURCE: Did you know that 76% of organizations find it challenging to control access to sensitive data? Access this brief infographic to gain a better understanding of common data governance challenges and the dire consequences if they are not addressed.
Posted: 08 May 2015 | Published: 24 Feb 2015

RSA
1 - 25 of 395 Matches Previous Page    1 2 3 4    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement