Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Challenge Handshake Authentication Protocol

RSS Feed   
ALSO CALLED: Handshake Authentication Protocol, CHAP
DEFINITION: This stands for Challenge Handshake Authentication Protocol, a type of authentication in which the authentication agent (typically a network server) sends the client program a key to be used to encrypt the username and password. This enables the username and password to be transmitted in an encrypted form to protect them against eavesdroppers.
Challenge Handshake Authentication Protocol Multimedia (View All Report Types)
23 Matches
11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

Business Continuity: What Have We Learned So Far?
sponsored by Akamai Technologies
WEBCAST: Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.
Posted: 04 Aug 2020 | Premiered: Aug 4, 2020

Akamai Technologies

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference

How to Re-establish Your Network and Security Perimeter
sponsored by Insight
WEBCAST: Data protection is being prioritized now more than ever. Organizations are looking for ways to improve their posture and maintain their business integrity by managing investments based on the correct risk profile. But when it comes to security, correctness takes time. Watch this webcast for a pragmatic approach to privacy and security.
Posted: 28 Jul 2020 | Premiered: Jul 28, 2020

Insight

How to Successfully Secure Ecommerce
sponsored by Rackspace
WEBCAST: With more and more business transacted online, and with cyberthreats growing more and more complex, businesses need to find ways to optimize the performance of their websites without compromising security or falling short of compliance. Watch this webinar presented by Rackspace and Akamai for a guide through this challenge.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Rackspace

Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO: With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

Protect Your Network Before Attacks Evolve
sponsored by Claranet
WEBCAST: Your most sensitive data lives on the endpoint and in the cloud. Fast reactions prevent potential breaches and require a combination of technology and resource. Watch this webinar on endpoint detection and response (EDR) demonstrating how you can fortify the edge with real-time monitoring and detection of malicious events on endpoints.
Posted: 24 Aug 2020 | Premiered: Aug 7, 2020

Claranet

Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST: Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020

Remediant

Replacing FTP Scripts with Managed File Transfer
sponsored by Help/Systems
WEBCAST: Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.
Posted: 12 Feb 2020 | Premiered: Feb 12, 2020

Help/Systems

Riverbed SD-WAN: Simple, Powerful, Transformative
sponsored by Riverbed
VIDEO: Every once in a while, a technology emerges that greatly simplifies how things get done. For IT networking professionals, SD-WAN can be one of those technologies. It can help improve how networks are designed, deployed, and managed. Watch this quick video to learn about the key features of Riverbed’s SD-WAN.
Posted: 10 Mar 2020 | Premiered: 17 Jul 2018

Riverbed

Securing the WAN in the Enterprise Cloud Era
sponsored by Citrix
WEBCAST: Now that your organization has adopted an SD-WAN, your infrastructure and applications face security challenges from new attack vectors. You need a multi-faceted security strategy with options to protect you at the branch, in data centers, and in the cloud. Join Citrix for this webinar on best practices to secure your WAN.
Posted: 03 Aug 2020 | Premiered: Jun 19, 2020

Citrix

Security Without Compromise: A New Approach to Eliminating Malware
sponsored by Menlo Security
WEBCAST: 50% of all cyberattacks are based in malware, and 99% of those are driven by email and web attack vectors. How can organizations stay protected? A new way to reduce threats is through a method called ‘isolation.’ Gartner estimates that by 2022, isolation can reduce end-user system attacks by 70%. Interested? Watch this webcast for a closer look.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Menlo Security

Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST: Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020

Remediant

Top Trends in Customer Identity and Access Management (CIAM) with analyst Mary Ruddy
sponsored by Okta
WEBCAST: Customer identity has gone mainstream. A seamless customer experience across devices is now expected. At the same time, security and privacy concerns are at an all-time high. View this webinar to hear from Gartner analyst Mary Ruddy and learn about findings from her recent research "Top 5 Trends in CIAM Solution Design".
Posted: 30 Sep 2020 | Premiered: Sep 30, 2020

Okta

Unpacking Research on Employee Security Awareness
sponsored by Mimecast
WEBCAST: The numbers are in: Information alone does not change people’s minds. Organizations will attempt to mold their employees into security encyclopedias, but without proper behavioral analysis, no amount of training will do what is desired.Immerse yourself in this webcast, which unpacks Forrester research and gets to the bottom of security awareness.
Posted: 21 Jul 2020 | Premiered: Jul 21, 2020

Mimecast

Using Network Segmentation and Microsegmentation to Improve Enterprise Defense
sponsored by Guardicore
WEBCAST: Security architects have historically taken an absolute approach to defense. Namely, if they build an impenetrable wall, then no one can get in. The problem is that if a mistake is made and the wall breached, everything behind it is at risk. This webcast covers microsegmentation, which builds many secure compartments rather than one wall.
Posted: 13 Jul 2020 | Premiered: Aug 22, 2019

Guardicore

Virtual Panel: COVID-19 & Public Transit
sponsored by CradlePoint
WEBCAST: COVID-19 has caused mass transit ridership and fare revenues to drop by more than 90%. Public transit will hopefully become disease-free sooner rather than later, but agencies must consider the connectivity of riders and how they are accounted for. Watch this webcast for a panel discussion on the implications of COVID-19 on transit technology.
Posted: 10 Sep 2020 | Premiered: Aug 5, 2020

CradlePoint

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks
23 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info