IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Multimedia (View All Report Types)
1 - 25 of 32 Matches Previous Page  |  Next Page
Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

The key implementation considerations for successful customer identity management
sponsored by Okta
VIDEO: In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

Improving Online Customer Experience with Identity Management
sponsored by Okta
VIDEO: Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

SMBs Need Improved Defenses to Protect Remote Workers
sponsored by Citrix
WEBCAST: Regardless of the outcome of this pandemic, it’s beginning to look like remote work will continue for the foreseeable future – especially among SMBs. In this webinar, explore the increasing risks and opportunities as they relate to securing remote workforces at SMBs, and discover how Citrix’s zero trust platform can help.
Posted: 28 Aug 2020 | Premiered: Aug 28, 2020

Citrix

How to Achieve Zero Touch in a Zero Trust Environment
sponsored by BlackBerry
WEBCAST: Implementing perimeter-based security architecture against modern threats will prove futile. Today, security must be traced back to the user, and networks must always be assumed as hostile. But doing so puts employee productivity at risk. Watch this webcast to go in-depth about zero trust and it can be balanced with functionality.
Posted: 24 Aug 2020 | Premiered: Aug 24, 2020

BlackBerry

Continuously Trust Zero
sponsored by IBM
WEBCAST: Data centers are no longer the control points they used to be, and therefore the traditional ‘perimeter’ defense is no longer as effective. As businesses shift to the cloud, DCs become increasingly distributed, and so more appointed security is required. Watch this webinar for a look at how a large company introduces a zero trust approach.
Posted: 18 Aug 2020 | Premiered: Jun 11, 2020

IBM

SailPoint Identity Now: Certification Creation
sponsored by SailPoint Technologies
VIDEO: Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.
Posted: 28 Jul 2020 | Premiered: 28 Jul 2020

SailPoint Technologies

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Identity Governance for Workday
sponsored by SailPoint Technologies
VIDEO: In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

SailPoint Identity Now: Certification Process Overview
sponsored by SailPoint Technologies
VIDEO: In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

SailPoint Identity Now: Dashboard Overview
sponsored by SailPoint Technologies
VIDEO: In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

Creating Digital Trust: Anchoring Remote Users to Real Identities
sponsored by Onfido
VIDEO: As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.
Posted: 23 Jul 2020 | Premiered: 03 Jun 2020

Onfido

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales

Automating Identity & Access Management
sponsored by Hitachi ID
WEBCAST: Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.
Posted: 14 Nov 2019 | Premiered: Feb 28, 2019

Hitachi ID

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

HID Global's ActivID® Authentication: Online Banking
sponsored by HID Global
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID Global

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
sponsored by Intel
WEBCAST: Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel
1 - 25 of 32 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info