IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 
Definition continues below.
Authentication Reports
1 - 25 of 420 Matches Previous Page  |  Next Page
Get Compliant and Stay Compliant
sponsored by SailPoint Technologies
WHITE PAPER: There are now dozens of government and industry laws pertaining to security and privacy, forcing organizations to adhere to a complex series of requirements. This white paper outlines key requirements of compliance mandates and provides recommendations on how to build an effective identity management strategy to meet compliance requirements.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

SailPoint Technologies

Market Pulse Survey
sponsored by SailPoint Technologies
WHITE PAPER: According to SailPoint Technologies' Market Pulse Survey, 3 in 5 respondents admitted they expect to be breached this year, but only 1/3 of them believe they won't even know when it happens. This resource explores how enterprises are changing their approach to security, amid the evolving threat landscape of the largest breaches ever recorded.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

SailPoint Technologies

Are you Ready for Cloud-Based Identity Governance?
sponsored by SailPoint Technologies
EBOOK: Successfully managing the adoption of SaaS applications – and securely migrating to a cloud enterprise – requires identity governance. This e-book details the importance of cloud-based identity governance and the importance of securely migrating to a cloud enterprise while still having full visibility across the IT infrastructure.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

SailPoint Technologies

Why Device Risk is an Essential Element for Your MFA Strategy
sponsored by iovation, Inc.
WEBCAST: Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.
Posted: 13 Dec 2017 | Premiered: Oct 31, 2017

iovation, Inc.

Identity Up in the Clouds
sponsored by SailPoint Technologies
EBOOK: As a result of the increase in cloud usage, many enterprises are facing challenges with running a hybrid environment, most importantly securing their users' access to all these apps. Explore this e-book to uncover how to effectively manage IAM within your cloud environments.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

The Anatomy of a Data Breach
sponsored by SailPoint Technologies
WHITE PAPER: 43% of the time data breaches are directly caused by insiders, according to SailPoint Technologies. Explore this white paper to gain insight into the anatomy of data breaches through 4 phases to help protect your organization against falling victim to such attacks.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

Omnichannel Authentication
sponsored by iovation, Inc.
RESOURCE: While the current banking experience is a multichannel approach, which provides fast access, it does not provide a secure, effortless user experience. This resource provides insight into omnichannel authentication within mobile banking to help provide customers a seamless, effortless, high-quality experience, while maintaining security.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

iovation, Inc.

Who Owns Your Data?
sponsored by SailPoint Technologies
EBOOK: 7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

Understand the State of Identity and Access Management
sponsored by SailPoint Technologies
WHITE PAPER: IAM continues to fight for priority in organizations' security strategies. This Forrester report outlines budgeting and spending, policies and tools in use, tech adoption plans, and other key IAM trends in enterprise organizations to help security pros assess their own IAM strategy.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

SailPoint Technologies

Stopping the Insider Threat
sponsored by SailPoint Technologies
WHITE PAPER: Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

SailPoint Technologies

Report: IAM Leadership Compass
sponsored by Janrain
WHITE PAPER: This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Key Considerations in Selecting a Customer IAM Solution
sponsored by Janrain
WHITE PAPER: The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

GDPR Primer and Readiness Assessment
sponsored by Janrain
RESOURCE: This data sheet provides a GDPR readiness assessment to ensure your organization will achieve compliance by May 2018.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Report: Customer Identity and Access Management
sponsored by Janrain
RESOURCE: In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.
Posted: 06 Dec 2017 | Published: 15 Jun 2017

Janrain

GDPR Security Strategies
sponsored by Oracle
VIDEO: The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation.
Posted: 06 Dec 2017 | Premiered: 01 Dec 2017

Oracle

Top Trends That Will Shape CIAM in 2018 and Beyond
sponsored by Janrain
WHITE PAPER: In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Janrain

Revolutionizing the Sharing Economy
sponsored by Evident
WHITE PAPER: According to the U.S. Department of Commerce, the sharing economy has the potential to increase to $335 billion by 2025. Take a look at this resource to uncover a security strategy for the sharing economy that can help advance identity and verification while allowing users to securely share personal data.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Evident

Executive Review: Consumer Identity and Access Management
sponsored by Janrain
WHITE PAPER: Consumer IAM is the fastest growing specialty in IAM that has emerged in the last few years to meet evolving business requirements. Explore this executive review to gain insight into consumer IAM and how it can help you improve your existing IAM and security strategy.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Janrain

Revolutionizing the Sharing of Personal Data
sponsored by Evident
WHITE PAPER: The average number of records stolen in a data breach is 24,089, according to IBM Security. This resource provides information into securing personal, sensitive data to minimize the risks of a data hack in order to protect your business.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Evident

Fighting Against Authorized Push Payment (APP) Scams
sponsored by HID Global
WHITE PAPER: This blog post provides insight into authorized push payment scams and how your enterprise can reduce the number of fraudulent account takeovers by improving your identification and authentication mechanisms.
Posted: 30 Nov 2017 | Published: 21 Nov 2017

HID Global

The 7 Challenges to Online Identity Verification
sponsored by Evident
WHITE PAPER: Lack of trust is the most important hurdle for users of the sharing economy, so providers must deliver security to their users. This white paper provides actionable steps to secure your business to demonstrate your marketplace is a safe place for people to engage.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Evident

The Sharing Economy: Who Will You Trust
sponsored by Evident
WHITE PAPER: With the evolving digital world, it is challenging to secure personal data and maintain an identity management platform. Explore this white paper to gain a deeper understanding of how you can improve your IAM strategy within the sharing economy in order to protect and secure your data.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Evident

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity
1 - 25 of 420 Matches Previous Page    1 2 3 4    Next Page
 
AUTHENTICATION DEFINITION (continued): …  to gain access for legitimate purposes. Mutual authentication is gaining acceptance as a tool that can minimize the risk of online fraud in e-commerce.With mutual authentication, a connection can occur only when the client trusts the server's digital certificate and the server trusts the client's certificate. The exchange of certificates is carried out by means of the Transport Layer Security (TLS) protocol. If the client's keystore contains more than one certificate, the certificate with the latest timestamp is used to authenticate the client to the server. This process reduces the risk that … 
Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement