IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts. To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports  … 
Definition continues below.
AuthenticationReports
301 - 325 of 384 Matches Previous Page  | Next Page
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.
Posted: 19 Dec 2008 | Published: 01 Apr 2008

Juniper Networks, Inc.

Meeting Today's Security Challenges with End-to-end Access Control
sponsored by Juniper Networks, Inc.
WHITE PAPER: This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.
Posted: 19 Dec 2008 | Published: 01 Mar 2008

Juniper Networks, Inc.

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.

Operations Energy Management: From Data Center through Facilities
sponsored by CA Technologies.
WHITE PAPER: Rising energy costs are driving IT and facilities managers alike in all types of organizations to come up with new and innovative ways to reduce the amount of energy used to power and cool the data center.
Posted: 10 Dec 2008 | Published: 13 Oct 2008

CA Technologies.

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Protecting CPNI - Top Four Tips for a Successful Security Program Deployment
sponsored by RSA
WHITE PAPER: With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

RSA

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises
sponsored by Global Knowledge
WHITE PAPER: This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by SearchMobileComputing
EBOOK: Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

SearchMobileComputing

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER: A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

VeriSign® Identity Protection Fraud Detection Service
sponsored by VeriSign EMEA
WHITE PAPER: This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

SearchSecurity.com

How to Extend your Virtual Private Network with Citrix GoToMyPC Corporate
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: Read this white paper to learn how companies can deliver more effective remote access by augmenting their traditional VPN with Web-based technologies.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Citrix Online - GotoMyPC

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

Making the FACTA Red Flags Rules Operational
sponsored by RSA
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

Workday Security: An Application Perspective
sponsored by Workday
WHITE PAPER: Read this white paper to learn about the innovative security features of Workday products, which focus on user authentication, authorization, and validation.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Workday

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Wireless Networking: Five Questions to Start With
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

10 Things IT Should Be Doing (but isn't)
sponsored by Varonis
WHITE PAPER: Check out this brief paper to learn the ten must-do actions for maximizing unstructured data protection.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

Sun xVM Virtualization Portfolio: Virtualizing the Dynamic Datacenter
sponsored by Sun Microsystems, Inc.
WHITE PAPER: This paper summarizes the benefits and challenges of traditional virtualization strategies, the advantages of Sun's approach, and the core capabilities of the Sun xVM portfolio.
Posted: 08 Sep 2008 | Published: 08 Sep 2008

Sun Microsystems, Inc.

Converged Video Network Security
sponsored by Alcatel-Lucent
WHITE PAPER: Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself.
Posted: 20 Aug 2008 | Published: 01 Apr 2007

Alcatel-Lucent

Best Practices for BlackBerry Administrators
sponsored by BlackBerry
WHITE PAPER: This whitepaper discusses best practices for managing your BlackBerry Enterprise Server running on Lotus Domino. Take a tour of the administrative features and tools that can make your job easier. This session is a must for any BlackBerry administrator.
Posted: 18 Aug 2008 | Published: 18 Aug 2008

BlackBerry
301 - 325 of 384 Matches Previous Page    11 12 13 14 15 16    Next Page
 
AUTHENTICATION DEFINITION (continued): …  OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity … 
Authentication definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement