IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
AuthenticationReports
301 - 325 of 398 Matches Previous Page  | Next Page
Enterprise Single Sign-On The Holy Grail of Computing
sponsored by Dell Software
WHITE PAPER: In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Role Based Access Control and Entitlement Management
sponsored by FoxT
PRESENTATION TRANSCRIPT: The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
Posted: 30 Sep 2009 | Published: 30 Sep 2009

FoxT

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

PortalGuard: Strengthening Authentication to Adapt to Changing Circumstances™
sponsored by PistolStar, Inc.
PRODUCT OVERVIEW: PortalGuard is a password authentication and security solution that allows end-users to authenticate and manage a portal password directly from a Web browser, while providing administrators with functionality to meet or exceed their security objectives.
Posted: 26 Aug 2009 | Published: 26 Aug 2009

PistolStar, Inc.

Portal Authentication: A Balancing Act Between Security, Usability & Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the problems with current authentication systems and the drivers that should be motivating organizations of all sizes to improve their access controls.
Posted: 26 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Internet-Scale Identity Systems: An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them.
Posted: 20 Aug 2009 | Published: 03 Aug 2009

Ping Identity Corporation

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Presentation Transcript: Reduce Costs by Automating Identity Management
sponsored by CA Technologies.
PRESENTATION TRANSCRIPT: Learn how you can use identity and access management to improve your proviciency, and it efficiency in particular, and what you can do to keep IAM projects alive in your organization.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

CA Technologies.

eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE: This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009

Information Security Magazine

Software Testing eZine Vol.2 - Testing Strategies for Complex Environments: Agile, SOA
sponsored by SearchSoftwareQuality.com
EZINE: In this issue of SearchSoftwareQuality.com's Software Testing eZine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology.
Posted: 06 May 2009 | Published: 06 May 2009

SearchSoftwareQuality.com

Shavlik Customer Update: What is the Conficker worm, referred to as "Downadup"?
sponsored by Shavlik Technologies
WHITE PAPER: This paper describes the risks posed by the Downadup worm and how Shavlik is uniquely suited to help customers respond quickly. Read this brief paper to learn how Shavlik makes it easy for users to do targeted installation of solutions that automate and control patch and configuration management processes while minimizing operational impact.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

Shavlik Technologies

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough
sponsored by eIQnetworks
WHITE PAPER: "Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

eIQnetworks

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.
Posted: 19 Dec 2008 | Published: 01 Apr 2008

Juniper Networks, Inc.

Meeting Today's Security Challenges with End-to-end Access Control
sponsored by Juniper Networks, Inc.
WHITE PAPER: This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.
Posted: 19 Dec 2008 | Published: 01 Mar 2008

Juniper Networks, Inc.

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.

Operations Energy Management: From Data Center through Facilities
sponsored by CA Technologies.
WHITE PAPER: Rising energy costs are driving IT and facilities managers alike in all types of organizations to come up with new and innovative ways to reduce the amount of energy used to power and cool the data center.
Posted: 10 Dec 2008 | Published: 13 Oct 2008

CA Technologies.

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Protecting CPNI - Top Four Tips for a Successful Security Program Deployment
sponsored by RSA, The Security Division of EMC
WHITE PAPER: With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

RSA, The Security Division of EMC

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises
sponsored by Global Knowledge
WHITE PAPER: This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by SearchMobileComputing
EBOOK: Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

SearchMobileComputing

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry
301 - 325 of 398 Matches Previous Page    11 12 13 14 15 16    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement