IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 
Definition continues below.
Authentication Reports
26 - 50 of 414 Matches Previous Page  |  Next Page
Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Next-Gen Autentication
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security classroom explores the latest in authentication methods and technologies.
Posted: 23 Sep 2016 | Premiered: 15 Sep 2016

SearchSecurity.com

Are You Fully Secure? Or Are You Using Weak Authentication Methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using authentication to improve secure access and protect valuable data.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

85% of Customers are Dissatisfied with the Authentication Process
sponsored by NICE Systems, Inc
WHITE PAPER: This infographic reveals what you can do to reduce the burden of authentication for your customers. Learn how to prevent fraud in your contact center, while minimizing interrogation and saving money on every call.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

NICE Systems, Inc

Real-Time Voice Authentication at the Call Center
sponsored by NICE Systems, Inc
WHITE PAPER: Biometrics offers one of the best opportunities to improve security and the customer experience. Discover how your enterprise can reduce handle time by 25 to 45 seconds, save significantly in the call center, and more.
Posted: 23 Aug 2016 | Published: 31 May 2016

NICE Systems, Inc

Minimizing the Identity Attack Vector with Continuous Authentication
sponsored by RSA Softcat
WHITE PAPER: Learn how continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

Businesses Should Begin Preparing for the Death of the Password
sponsored by Gigya
ANALYST REPORT: Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Red Hat Enterprise Linux: Secure Identity Management
sponsored by Red Hat
PRODUCT OVERVIEW: Address the challenges of managing identities in Linux or a mixed Linux/Windows environment by centralizing management in one interface. Download this paper to take advantage of Linux's direct integration into your environment to provide host-based access control, and more.
Posted: 14 Jul 2016 | Published: 31 Dec 2014

Red Hat

Security Solutions for Mobile Users in the Workplace
sponsored by HID
EBOOK: This e-book describes the security landscape for mobile devices and how you can improve the user experience on mobile devices while still protecting your assets and managing costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

HID

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Moving Past the Password? Not So Fast
sponsored by SearchSecurity.com
EBOOK: The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
Posted: 20 May 2016 | Published: 20 May 2016

SearchSecurity.com

Six Steps to Controlling the Uncontrollable
sponsored by Microsoft
WHITE PAPER: With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.
Posted: 18 May 2016 | Published: 01 Apr 2016

Microsoft

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

IBM

How IT Leaders Are Innovating with Customer Identity Management
sponsored by Gigya
WHITE PAPER: With IT budgets limited, enterprises often struggle to secure funds for innovations that enable crucial relationships with customers. Access this white paper that explains how a separate customer identity management layer can help you attract customers while maximizing budget and ROI.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Gigya

Improve User Acquisition with Customer Identity & Access Management
sponsored by Gigya
WHITE PAPER: In order to offer customers highly relevant content and drive revenue, media publishing companies need comprehensive user profiles to gain deeper insight into users' preferences and needs. Discover how a customer identity and access management solution can empower you to increase customer acquisition, improve the user experience, and more.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

Gigya

Case Study: American Cancer Society Adopts a Comprehensive Constituent View
sponsored by Gigya
CASE STUDY: The American Cancer Society needed to more efficiently and securely manage the identities of its volunteers, donors, and participants. This case study discusses the authentication strategy that enabled them to capture and organize more data about their constituents' identities to make complete user profiles.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Gigya

Security for the Internet of Things: Upcoming Trends to Watch
sponsored by Microsoft
RESEARCH CONTENT: By 2020, over 25% of identified attacks in enterprises will involve the Internet of Things (IoT). In this resource, Gartner's IoT security analysts offer predictions for upcoming market trends and recommendations about which security services are worth the investment.
Posted: 23 Mar 2016 | Published: 09 Dec 2015

Microsoft

Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
26 - 50 of 414 Matches Previous Page    1 2 3 4 5    Next Page
 
AUTHENTICATION DEFINITION (continued): …  to gain access for legitimate purposes. Mutual authentication is gaining acceptance as a tool that can minimize the risk of online fraud in e-commerce.With mutual authentication, a connection can occur only when the client trusts the server's digital certificate and the server trusts the client's certificate. The exchange of certificates is carried out by means of the Transport Layer Security (TLS) protocol. If the client's keystore contains more than one certificate, the certificate with the latest timestamp is used to authenticate the client to the server. This process reduces the risk that … 
Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement