IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 
Definition continues below.
Authentication Reports
26 - 50 of 420 Matches Previous Page  |  Next Page
Credential Stuffing a Security Epidemic
sponsored by F5 Networks
WHITE PAPER: 81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

A Collaborative Strategy for Your Access Management
sponsored by SailPoint Technologies
WHITE PAPER: Today's rapidly changing business environment demands that businesses be agile, innovative and secure. This white paper examines a collaborative strategy of integrating Microsoft Azure Active Directory with the identity governance capabilities of SailPoint Power of Identity.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

SailPoint Technologies

Matching Your Authentication to the Speed of Your Business
sponsored by MicroFocus
WHITE PAPER: This white paper outlines the reality of today's IT environments and the authentication risks associated with them, and explores some tips as to how you can balance the priorities of your business owners and those of central IT to keep your organization productive and safe.
Posted: 15 Nov 2017 | Published: 29 Sep 2017

MicroFocus

A Collaborative Integration for IAM
sponsored by SailPoint Technologies
WHITE PAPER: This paper provides a collaboration strategy of integrating Microsoft Azure Active Directory with SailPoint Identity Governance to improve your IAM approach.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Cloud IAM Goes Beyond SSO
sponsored by SailPoint Technologies
WHITE PAPER: With the adoption of cloud IAM on the rise, managing the user's journey, access control, and governance functionality is mandatory. This paper offers 4 challenges that drive cloud IAM adoption and provides invaluable information on cloud access with single-sign-on, access governance and cloud IAM features.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Security and risk management leaders responsible for IAM should be aware of functional differences between on-premises and cloud-delivered identity governance and administration (IGA). This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's IGA products as well as, a market overview.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

Technology Evolves - Your Backup Should Too
sponsored by Acronis
WHITE PAPER: As technology evolves and become more complex, your security stance should too. Explore this white paper to gain insight into how you can boost your security backup strategy to protect against ransomware, stop data loss, and improve compliance and validity of your recovery.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Acronis

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

Citrix Systems, Inc.
sponsored by Symantec
WHITE PAPER: This case study reveals how Citrix Systems, Inc. wanted to move two-factor authentication (2FA) into the cloud to reduce costs and improve flexibility and reliability.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Symantec

SSO in the Cloud and Mobile Era
sponsored by TechTarget
RESOURCE: Does enterprise single sign-on (SSO) provide adequate security? Our exclusive resource, SSO in the Cloud and Mobile Era, explores the promises and challenges ahead for SSO technology.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

TechTarget

VPN Access Made Easier Without Sacrificing Security
sponsored by HID Global
JOURNAL ARTICLE: VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.
Posted: 21 Sep 2017 | Published: 15 Aug 2017

HID Global

Privilege Management Overview: Strengths and Challenges
sponsored by One Identity
ANALYST REPORT: In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

One Identity

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
RESOURCE: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

Simplify Authentication with Personal Identity Verification
sponsored by HID Global
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID Global

The Pitfalls and Promises of Authentication in the IoT
sponsored by iovation, Inc.
WEBCAST: Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.
Posted: 07 Aug 2017 | Premiered: Aug 7, 2017

iovation, Inc.

Overcome Authentication Challenges: Balancing Security and User Experience
sponsored by iovation, Inc.
VIDEO: How can you increase authentication security without impacting user experience? Take a closer look at flexible authentication that can help you meet these challenges with global fraud and trust insight, interactive multi-factor authentication, and more.
Posted: 01 Aug 2017 | Premiered: 01 Aug 2017

iovation, Inc.

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Don't Let SaaS Cloud Your Security
sponsored by Verizon
WHITE PAPER: The cloud is transforming all aspects of business, so the need for cloud security is more important than ever. Key into this white paper to discover 5 ways to stay secure in the cloud.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon

20 Practical Tips for Single Sign-On Implementation
sponsored by Imprivata
WHITE PAPER: Uncover 20 valuable tips to ensure successful SSO for your organization, so that your care providers can spend less time remembering passwords and more time treating patients.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Imprivata
26 - 50 of 420 Matches Previous Page    1 2 3 4 5    Next Page
 
AUTHENTICATION DEFINITION (continued): …  to gain access for legitimate purposes. Mutual authentication is gaining acceptance as a tool that can minimize the risk of online fraud in e-commerce.With mutual authentication, a connection can occur only when the client trusts the server's digital certificate and the server trusts the client's certificate. The exchange of certificates is carried out by means of the Transport Layer Security (TLS) protocol. If the client's keystore contains more than one certificate, the certificate with the latest timestamp is used to authenticate the client to the server. This process reduces the risk that … 
Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement