IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 
Definition continues below.
Authentication Reports
26 - 50 of 416 Matches Previous Page  |  Next Page
SaaS Safety and Security: Taming the Office Password Monster
sponsored by Dashlane Inc.
WHITE PAPER: Learn if you're leaving the door open for hackers in this white paper as it shines a light on the many password management blunders. Discover how to keep login simple for your users without creating undue risk.
Posted: 24 Dec 2015 | Published: 23 Dec 2015

Dashlane Inc.

INTEGRIS Health Turns to Streamline Linux Server Management and Mitigate System Vulnerabilities
sponsored by FoxT
CASE STUDY: Uncover how INTEGRIS Health, Oklahoma's largest health system of 9,000 employees, accelerated deployment of users and user groups onto their Linux servers and reduces time to give users privileged access.
Posted: 22 Dec 2015 | Published: 16 Dec 2015

FoxT

Configuration Management: Puppet or Chef?
sponsored by FoxT
WHITE PAPER: This white paper pits Puppet against Chef and brings the shortcomings of each to light to help your organization decide which strategy is right for your IAM needs.
Posted: 22 Dec 2015 | Published: 04 Dec 2015

FoxT

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Global Food and Beverage Provider Centralizes Privileged Access Management
sponsored by FoxT
CASE STUDY: In this white paper, you'll review how one global food and beverage provider automated identity and access management (IAM) processes to rectify a failed SOX audit. Read on to learn if their modified strategy is right for your organization.
Posted: 21 Dec 2015 | Published: 01 Dec 2015

FoxT

Financial Institution Uses BoKs to Centralize Access Controls Across 50,000 Servers
sponsored by FoxT
CASE STUDY: In this case study, you will learn how to centralize and automate the user account administration across your servers, enabling you to allocate fewer resources to security administration and control access. Access this study to address key regulatory compliance mandates.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

Deliver Secure, New Business Services and Improve the Customer Experience
sponsored by CA Technologies
WHITE PAPER: This resource discusses ways organizations can deliver secure, new business services with identity management in mind. By accessing, you'll find a checklist designed to help you simultaneously grow and protect your business.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

CA Technologies

Specification IAM Server Control
sponsored by FoxT
WHITE PAPER: This white paper teaches you how to enable holistic identity management, strong authentication, granular control, and SSO for users while mitigating unwanted access.
Posted: 17 Dec 2015 | Published: 02 Dec 2015

FoxT

Social Networking: 5 Risks of Team Login Sharing
sponsored by Dashlane Inc.
WHITE PAPER: Discover the 5 risks of team social networking login sharing and how to secure an always-on culture to connect with customers.
Posted: 17 Dec 2015 | Published: 09 Dec 2015

Dashlane Inc.

Password Hacking: Are You Safer in the Cloud?
sponsored by Dashlane Inc.
WHITE PAPER: This white paper teaches you how to secure your password management strategy in the cloud in 3 simple steps. Continue reading to learn why you need to kill simple password rules and how to adapt to cloud authentication and access.
Posted: 15 Dec 2015 | Published: 08 Dec 2015

Dashlane Inc.

How to Integrate Siloed Identities and Data
sponsored by Radiant Logic, Inc.
WHITE PAPER: This comprehensive white paper digs into the current fragmented landscape of identity infrastructures. Read on for expert tips on integrating identities and data out of silos.
Posted: 14 Dec 2015 | Published: 31 Dec 2012

Radiant Logic, Inc.

Keep Your Patient Records Privacy
sponsored by OptioLabs
WHITE PAPER: This white paper explores the unique challenges of real-life data security and privacy in the healthcare industry. Read on to learn how you can keep all of your sensitive patient data private, even when it's displayed on a screen.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

OptioLabs

Secure Centralized Identity and Password Management
sponsored by Dashlane Inc.
WEBCAST: In this webcast, learn how to safely centralize all login credentials for users on their own desktops and mobile devices.
Posted: 07 Dec 2015 | Premiered: Nov 11, 2015

Dashlane Inc.

How to Ensure Strong Passwords and Better Authentication in Enterprises
sponsored by Dashlane Inc.
EGUIDE: This expert e-guide explores two-factor authentication alternatives to increase identity and access management (IAM) in the enterprise as well as how to bolster remote access authorization security. Inside, learn best practices for users, IT, and the helpdesk.
Posted: 04 Dec 2015 | Published: 25 Nov 2015

Dashlane Inc.

Choosing an IAM Architecture for Improved Business Processes
sponsored by Dashlane Inc.
EGUIDE: This white paper presents the features and capabilities an IAM architecture needs to have to improve business processes and simplify onboarding. Read on to learn how to determine if a provider-centric or user-centric model is the best for your organization.
Posted: 03 Dec 2015 | Published: 30 Nov 2015

Dashlane Inc.

Internet Password Security Holiday Shopping Roundup
sponsored by Dashlane Inc.
RESOURCE: This infographic examines the password policies of major e-commerce sites and evaluates their password security policies. View now to learn what users and businesses alike can do to strengthen password security and reduce data breaches. Uncover the top 4 user password security best practices.
Posted: 02 Dec 2015 | Published: 04 Nov 2015

Dashlane Inc.

Better IAM Means a Better Experience
sponsored by Dashlane Inc.
WHITE PAPER: Could SSO be the key to blocking credential and identity theft? In this white paper, learn about next-gen IAM approaches to mitigate credential theft.
Posted: 25 Nov 2015 | Published: 18 Nov 2015

Dashlane Inc.

A Guide to Selecting the Best Authentication and Access Control for Your Enterprise
sponsored by SecureAuth
WHITE PAPER: Discover the 4 critical categories to consider when choosing an advanced authentication and access control strategy.
Posted: 13 Nov 2015 | Published: 28 Oct 2015

SecureAuth

The Economics of Digital Identity
sponsored by Oracle Corporation
WHITE PAPER: In this report, learn more about digital identities, the challenges organizations are facing, and strategies to clear those hurdles.
Posted: 30 Oct 2015 | Published: 01 Oct 2015

Oracle Corporation

Best Practices for Cloud-Based Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: In this expert e-guide, you'll learn the 6 best practices for implementing cloud-based IAM in your organization to avoid security vulnerabilities. View now to learn how to assess your IAM as a service (IAMaaS) options.
Posted: 11 Sep 2015 | Published: 03 Sep 2015

Radiant Logic, Inc.

Is Third-Party Access the Next IAM Frontier?
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide explores the lack of IAM security for third parties and the steps to take to secure your data. Access this exclusive resource now to rectify lapses in third-party security before vulnerabilities can be exploited.
Posted: 11 Sep 2015 | Published: 02 Sep 2015

Radiant Logic, Inc.

Can Directory Services Simplify AD Management?
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive expert webcast, learn more about the identity challenges associated with Active Directory. View now to uncover the steps your organization needs to take to strengthen you IAM strategy and improve overall security.
Posted: 10 Sep 2015 | Premiered: Aug 26, 2015

Radiant Logic, Inc.

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchSecurity.com
26 - 50 of 416 Matches Previous Page    1 2 3 4 5    Next Page
 
AUTHENTICATION DEFINITION (continued): …  to gain access for legitimate purposes. Mutual authentication is gaining acceptance as a tool that can minimize the risk of online fraud in e-commerce.With mutual authentication, a connection can occur only when the client trusts the server's digital certificate and the server trusts the client's certificate. The exchange of certificates is carried out by means of the Transport Layer Security (TLS) protocol. If the client's keystore contains more than one certificate, the certificate with the latest timestamp is used to authenticate the client to the server. This process reduces the risk that … 
Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement