IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication White Papers (View All Report Types)
1 - 25 of 158 Matches Previous Page  |  Next Page
Guide to Zero Trust for Federal Agencies
sponsored by Gigamon
WHITE PAPER: Cyberattacks targeting federal agencies are growing in both volume and complexity, and existing tactics are unable to protect these networks. To meet rising threats, security leaders are adopting a zero-trust model, a concept that states that users, devices and apps can’t be trusted without authentication. Read on to learn more.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Gigamon

The IT Director's Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: When it comes to managing cybersecurity, IT leaders & their teams are at a disadvantage: As threat methods are increasing in frequency & complexity, security teams must ensure protection with limited resources. Download this checklist as you develop your cybersecurity strategy & make effective use of existing resources.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Arctic Wolf Networks, Inc.

Appian for Insurance: Underwriting Authority Management
sponsored by Appian
WHITE PAPER: For insurance companies, ensuring that underwriting authority information is correct, updated, and trusted is important to avoid financial risks. This white paper delves into advanced records management services, discussing how low-code platforms can help in the struggle to keep underwriting authority simple and secure. Read the paper here.
Posted: 27 Jan 2020 | Published: 27 Jan 2020

Appian

A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

A CISO’s Guide to Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.
Posted: 23 Jan 2020 | Published: 31 Oct 2018

ShieldX

Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017

ShieldX

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

The Evolution of Zero Trust
sponsored by Banyan Security
WHITE PAPER: As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.
Posted: 03 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

CyberArk Alero
sponsored by Cyber-Ark Software
WHITE PAPER: As businesses continue to rely on remote vendors to manage portions of their IT infrastructure, providing privileged access to off-site staff becomes increasingly critical & traditional services aren’t designed to meet this challenge. Read on to learn more about a service designed to provide secure infrastructure access to remote devices.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Cyber-Ark Software

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

Privileged Access Management Buyers' Guide
sponsored by Centrify Corporation
WHITE PAPER: This buyers' guide is designed to help you choose the right privileged access management solution for your organization. Read on for the 9 major areas needed for your company to achieve strong privileged access management, and compare the features and capabilities to look for when selecting a solution.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Centrify Corporation

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS

Where Security Accountability Stops and Starts In the Public Cloud
sponsored by Cyber-Ark Software
WHITE PAPER: Whether in the cloud or on-premises, credentials are vital to secure and manage. It is especially important to protect privileged credentials because they allow the escalation of privileges within the cloud infrastructure. In this white paper, learn why a privileged access security strategy is key to protecting critical data in the cloud.
Posted: 15 Jul 2019 | Published: 30 Jun 2019

Cyber-Ark Software

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

How to Guide: Zero Trust Security Transformation
sponsored by Akamai Technologies
WHITE PAPER: The notion of a network perimeter can't be relied on in today's business landscape. A strategic security framework is needed. Download this guide to zero trust security for an understanding of what it is and why it's important for organizations to implement today.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Akamai Technologies

Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER: Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019

Proofpoint

Stopping Email Fraud
sponsored by Proofpoint
WHITE PAPER: Email fraud has cost victims more than $12.5 billion between the end of 2013 and 2018, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 21 Jun 2019 | Published: 31 Jan 2018

Proofpoint

Automation First: A Practical Approach to IAM
sponsored by Hitachi ID
WHITE PAPER: This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

A Holistic Approach To Identity And Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.
Posted: 11 Apr 2019 | Published: 23 Feb 2018

HID Global
1 - 25 of 158 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info