IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
AuthenticationReports
226 - 250 of 384 Matches Previous Page  | Next Page
E-Guide: Preventing and detecting security vulnerabilities in Web applications
sponsored by SearchSecurity.com
EGUIDE: The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

Building the Right Mobile Security Toolkit
sponsored by SearchSecurity.com
EGUIDE: Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

SearchSecurity.com

Unified and Intelligent Identity and Access Management
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 08 Jul 2011 | Published: 08 Jul 2011

Dell Software

GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations
sponsored by GlobalScape
CASE STUDY: In this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well.
Posted: 08 Jul 2011 | Published: 07 Jul 2011

GlobalScape

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

AGESIC (Uraguay)
sponsored by IBM
CASE STUDY: Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
sponsored by Intel
PRESENTATION TRANSCRIPT: User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk.  Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
Posted: 20 May 2011 | Published: 20 May 2011

Intel

Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance
sponsored by Intel
PRESENTATION TRANSCRIPT: In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
Posted: 19 May 2011 | Published: 19 May 2011

Intel

Implementing Database Security and Auditing - Authentication and Password Security
sponsored by IBM
EBOOK: In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Simplifying management and lowering total cost of ownership for SSL certificates
sponsored by GlobalSign
WHITE PAPER: This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
sponsored by Intel
WHITE PAPER: Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

Forrester Report: The Total Economic Impact of Oracle Identity Manager
sponsored by Oracle Corporation
ANALYST REPORT: This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results.
Posted: 08 Apr 2011 | Published: 03 Nov 2008

Oracle Corporation

Fast, Secure Access to VDI Applications: The Role of Automated Access in Accelerating Virtual Desktop Adoption
sponsored by Imprivata
WHITE PAPER: This whitepaper looks at ways that organizations can increase virtual desktop adoption and security simultaneously using automated access for VMware View™ 4.5 and Oracle’s Sun Ray.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

Imprivata

Adaptive Access Management: An ROI Study
sponsored by Oracle Corporation
WHITE PAPER: Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
Posted: 31 Mar 2011 | Published: 01 Sep 2010

Oracle Corporation

Cloud Access 360 Overview Video
sponsored by Intel
VIDEO: Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.
Posted: 29 Mar 2011 | Premiered: 29 Mar 2011

Intel

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel

Presentation Transcript: Changing Authentication Options
sponsored by ActivIdentity Corporation
PRESENTATION TRANSCRIPT: Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

ActivIdentity Corporation

Presentation Transcript: Risk Mitigation – Bang for the Buck
sponsored by ActivIdentity Corporation
PRESENTATION TRANSCRIPT: Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

ActivIdentity Corporation

Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Defender 5: The Right Way to Prove, Identify and Establish Trust
sponsored by Dell Software
WHITE PAPER: The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password.
Posted: 14 Feb 2011 | Published: 11 Feb 2011

Dell Software

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Solution Summary  - Secure Cloud
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

A More Secure Front Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Imprivata

Top Ten Database Security Threats
sponsored by Imperva
WHITE PAPER: The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva
226 - 250 of 384 Matches Previous Page    8 9 10 11 12 13    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement