IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
AuthenticationReports
126 - 150 of 384 Matches Previous Page  | Next Page
Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Mobile: The Technology Game-Changer in 2013
sponsored by SearchSecurity.com
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

SearchSecurity.com

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett-Packard Company
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett-Packard Company

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Expanding Web Single Sign-On to Cloud and Mobile
sponsored by CA Technologies.
WHITE PAPER: This informative white paper explores security solutions that were built to strike the right balance between data security and user access convenience.
Posted: 11 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Server-Gated Cryptography: Providing Better Security for More Users
sponsored by Thawte Inc.
WHITE PAPER: Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace.
Posted: 10 May 2013 | Published: 10 May 2013

Thawte Inc.

Hot Tips for Securing Your Wireless Network
sponsored by Sophos, Inc.
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos, Inc.

Threat Prevention Techniques: Best Practices for Threat Management
sponsored by GeoTrust, Inc.
EGUIDE: SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
Posted: 02 May 2013 | Published: 02 May 2013

GeoTrust, Inc.

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Complete and Scalable Access Management
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This comprehensive white paper takes a look at the current state of identity and access management highlighting the way mobile and social computing are impacting these technologies. Learn why a platform approach to access management is the best way to meet your organization's needs.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

PhoneFactor Case Study: Fredrikson & Byron, P.A.
sponsored by PhoneFactor
CASE STUDY: Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

PhoneFactor

Considerations for enterprise mobile access and SSO technology
sponsored by Centrify Corporation
EGUIDE: This expert E-Guide offers access management tips and best practices in the age of the cloud and mobility. Learn how you can deliver single sign-on (SSO) to enable safe access, and uncover considerations for two-factor mobile authentication by reading on.
Posted: 22 Feb 2013 | Published: 22 Feb 2013

Centrify Corporation
126 - 150 of 384 Matches Previous Page    4 5 6 7 8 9    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement