IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
AuthenticationReports
301 - 325 of 348 Matches Previous Page  | Next Page
SAP Netweaver: Streamlining the Transition to Services-Based IT Security
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
Posted: 18 Jun 2008 | Published: 01 Feb 2006

SAP America, Inc.

The Evolution of Password Authentication and Management: A Simple Solution
sponsored by PistolStar, Inc.
WHITE PAPER: This paper delves into the world of password authentication and management, as passwords serve a very significant purpose, they have not been without their own set of issues and obstacles for organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

America's Quest for IPv6 - Part II: An Analysis of the Business and Financial Metrics of the Coming IPv6 Marketplace
sponsored by Command Information
WHITE PAPER: the transition to IPv6 is very much on its way to becoming a viable, profitable market. This white paper this conclusion with some attention grabbing highlights...
Posted: 09 Jun 2008 | Published: 09 Jun 2008

Command Information

America's Quest for IPv6 - Part I: A Business Perspective
sponsored by Command Information
WHITE PAPER: This paper emphasizes that American organizations must adopt IPv6 today and describes the features and functions that will keep them competitive on the global stage.
Posted: 09 Jun 2008 | Published: 09 Jun 2008

Command Information

Preparing the WLAN for Voice Communications WP
sponsored by Avaya Inc.
WHITE PAPER: Companies at the cutting edge are finding it takes planning to implement effectively and that some of their assumptions about the current state of their wireless.
Posted: 09 Jun 2008 | Published: 01 May 2005

Avaya Inc.

Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER: This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008

Avaya Inc.

EMC Documentum Information Rights Management
sponsored by EMC Corporation
WHITE PAPER: This White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients.
Posted: 05 May 2008 | Published: 12 Dec 2006

EMC Corporation

Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER: Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008

Citrix

Leverage Active Directory with Kerberos to Eliminate HTTP Password
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.
Posted: 17 Apr 2008 | Published: 01 Apr 2008

PistolStar, Inc.

Facilitating Enterprise PCI DSS Compliance - Executive Summary
sponsored by GlobalScape
WHITE PAPER: The GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements.
Posted: 16 Apr 2008 | Published: 15 Apr 2008

GlobalScape

Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER: This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008

Oracle Corporation

Preparation by Automation: Reducing the Cost, Pain, Time, and Risk of IT Security Audits
sponsored by TraceSecurity
WHITE PAPER: This white paper explains how IT organizations can use automation to better prepare themselves for IT security audits, thereby significantly reducing the cost, pain, time, and risk associated with them.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

TraceSecurity

Best Practices for Archiving Lotus Domino Environments
sponsored by Symantec Corporation
WEBCAST: This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
Posted: 07 Mar 2008 | Premiered: Mar 19, 2008, 14:00 EDT (18:00 GMT)

Symantec Corporation

Securely Enabling VoIP Remote Users
sponsored by Sipera Systems
WHITE PAPER: This white paper details the requirements for securely enabling VoIP remote users and why traditional data security products, such as IPSec VPNs, are not able to properly handle them.
Posted: 29 Feb 2008 | Published: 01 Mar 2007

Sipera Systems

Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER: When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

EMBASSY Remote Administration Server (ERAS)
sponsored by Wave Systems Corp.
PRODUCT OVERVIEW: Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives.
Posted: 20 Feb 2008 | Published: 01 Feb 2008

Wave Systems Corp.

Entrust IdentityGuard for Enterprise
sponsored by Entrust, Inc.
WHITE PAPER: As an established global leader in layered security strategies, Entrust offers a cost-effective versatile authentication platform that can help organizations protect the identities of employees and partners accessing sensitive enterprise data.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Top 3 Tips to Securing Your Portal - And Protecting Your Customer
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Enterprises are striving to accelerate their businesses by sharing core business data across all channels. Learn how you can strengthen your organization's portal(s), improve customer security and inspire customer confidence.
Posted: 11 Feb 2008 | Published: 12 Feb 2008

RSA, The Security Division of EMC

CyberFusion Integration Suite™ (CFI): Managed File Transfer (MFT)
sponsored by Proginet Corporation
PRODUCT LITERATURE: CyberFusion Integration Suite (CFI)™, from Proginet, is the world's most advanced managed file transfer solution.
Posted: 01 Feb 2008 | Published: 01 Jan 2008

Proginet Corporation

Parkview Adventist Medical Center Clinicians Get Security at Their Fingertips with Imprivata
sponsored by Imprivata
CASE STUDY: By incorporating finger biometric scanning into the solution, Parkview would enable each doctor or nurse to log on to any PC at the facility with a single fingertip swipe.
Posted: 24 Jan 2008 | Published: 01 Jan 2007

Imprivata

Keeping Your Data Safe and Your Networks Connected
sponsored by SonicWALL
WHITE PAPER: This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

Centralized management for UNIX, Linux, Web and database platforms with Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Enable UNIX and Linux server workstations to participate seamlessly in an Active Directory domain, establishing Directory as the single point of administration and security policy enforcement. Also, learn how to eliminate security exposures to...
Posted: 10 Dec 2007 | Published: 01 Nov 2007

Centrify Corporation

Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER: Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007

BeyondTrust Corporation

The Case for Application Security: How Real Is the Threat and What Are Your Options
sponsored by Fortify Software
WHITE PAPER: This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
Posted: 24 Oct 2007 | Published: 24 Oct 2007

Fortify Software

Secure Remote Access
sponsored by RSA, The Security Division of EMC
BROCHURE: This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...
Posted: 27 Sep 2007 | Published: 26 Sep 2007

RSA, The Security Division of EMC
301 - 325 of 348 Matches Previous Page    11 12 13 14    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement