Standards  >   Network Protocols  >   Network Authentication Protocols  >  

RADIUS Protocol

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Remote Authentication, Remote Authentication Dial-in User Service Protocol
DEFINITION: Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to maintain user profiles in a central database that all remote servers can share. It provides better security, allowing  … 
Definition continues below.
RADIUS Protocol Reports
51 - 75 of 97 Matches Previous Page  |  Next Page
Leverage Static Analysis in Automotive Functional Safety
sponsored by Rogue Wave Software
WEBCAST: This webinar explores how static code analysis can be used as a real contributor to functional safety, rather than just deployed as a means of ticking another box during an audit.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

Multiple Country Implementation — Influencing Factors and Approaches
sponsored by
ESSENTIAL GUIDE: This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

Network Purchasing Intentions 2013
sponsored by
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Next Generation Network Management Techniques
sponsored by
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat Consulting: Systems Management
sponsored by Red Hat
WHITE PAPER: This white paper explains how you can do more with less time and money. Read now to enable business growth within a consistent environment. Learn what consultants can give your organization.
Posted: 05 Aug 2015 | Published: 31 Jul 2013

Red Hat

Secure the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015


Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Key Considerations for MPLS IP-VPN Success
sponsored by XO Communications
WHITE PAPER: Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

Managing Virtualized Networks
sponsored by
EGUIDE: This Tech Guide from on managing virtualized networks provides the guidance you need to start putting your ideal on-premises network management system in place, and also touches on the managed services options available. View now to learn more!
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Networking Basics: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014


OpenFlow and SDN: What's in Store?
sponsored by Big Switch Networks
EGUIDE: This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

Big Switch Networks

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
sponsored by Bradford Networks
PRESENTATION TRANSCRIPT: Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

Bradford Networks

Redefining Cloud Network Virtualization with OpenFlow
sponsored by NEC Corporation of America
WHITE PAPER: NEC ProgrammableFlow takes a first step toward end-to-end network-level virtualization with the potential to make a radical impact on how cloud networks are operated, managed and scaled.
Posted: 29 Sep 2011 | Published: 28 Sep 2011

NEC Corporation of America

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009


Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

SDN: A pragmatic approach to increasing network agility from HP Network Services
sponsored by HP
WHITE PAPER: SDN is the network of the future, and if you start preparing for it today, then you're in a better place to take full advantage of it as the technology matures.
Posted: 18 Sep 2014 | Published: 18 Sep 2014


Secure File Transfer: Send it Fast, but Send it Safely
sponsored by
EBOOK: FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009


SIP trunking services close cost gaps around mobility
sponsored by Cox Communications, Inc.
EGUIDE: Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cox Communications, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.
51 - 75 of 97 Matches Previous Page    1 2 3 4    Next Page
RADIUS PROTOCOL DEFINITION (continued): … Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to maintain user profiles in a central database that all remote servers can share. It provides better security, allowing a company to set up a policy that can be applied at a single administered network point. Having a central service also means that it's easier to track usage for billing and for keeping network statistics. Created by Livingston (now owned by Lucent), RADIUS is a de facto industry standard used by a number of network product companies and is a proposed IETF standard.
RADIUS Protocol definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement