IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication White Papers (View All Report Types)
1 - 25 of 163 Matches Previous Page  |  Next Page
Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

Top Reasons Why Identity Governance Matters for Chief Information Officers
sponsored by Imprivata
WHITE PAPER: Forward-looking CIOs are turning to healthcare-specific technologies to automate identity governance functions, reduce operating expenses, and free up staff to focus on business-critical tasks. In this white paper, learn how Imprivata Identity Governance can help address Identity and Access Management challenges for CIOs.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

Privileged Access Management Buyers' Guide
sponsored by Centrify Corporation
WHITE PAPER: This buyers' guide is designed to help you choose the right privileged access management solution for your organization. Read on for the 9 major areas needed for your company to achieve strong privileged access management, and compare the features and capabilities to look for when selecting a solution.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Centrify Corporation

The Perimeter at the Data Object: Zero Trust and Data Protection
sponsored by Virtru
WHITE PAPER: Discover how to use a data-centric approach to embrace the core tenets of Zero Trust, how the Trusted Data Format (TDF) fulfills the least privileged access approach of a Zero-Trust strategy, and how to get started with Zero Trust today.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Virtru

6 Steps to Achieving Data Access Governance
sponsored by One Identity
WHITE PAPER: Organizations need to satisfy compliance requirements and be able to quickly address security threats. They need to centralize the access request process and put an end to ambiguity about who has access to what. In this white paper, discover how organizations can achieve this by following 6 steps to implement data access governance.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

One Identity

Understanding Privileged Identity Theft
sponsored by One Identity
WHITE PAPER: Privileged Identity Theft is a widespread technique in some of the largest data breaches and cyberattacks. In this white paper, learn why privileged identities pose such a risk to enterprises and how your organization can protect itself.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

One Identity

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS

Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization
sponsored by FairWarning
WHITE PAPER: 1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this white paper, explore 5 of these profiles and learn how to protect your organization from each.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

FairWarning

Where Security Accountability Stops and Starts In the Public Cloud
sponsored by Cyber-Ark Software
WHITE PAPER: Whether in the cloud or on-premises, credentials are vital to secure and manage. It is especially important to protect privileged credentials because they allow the escalation of privileges within the cloud infrastructure. In this white paper, learn why a privileged access security strategy is key to protecting critical data in the cloud.
Posted: 15 Jul 2019 | Published: 30 Jun 2019

Cyber-Ark Software

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

How to Guide: Zero Trust Security Transformation
sponsored by Akamai Technologies
WHITE PAPER: The notion of a network perimeter can't be relied on in today's business landscape. A strategic security framework is needed. Download this guide to zero trust security for an understanding of what it is and why it's important for organizations to implement today.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

Akamai Technologies

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by Cyber-Ark Software
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER: Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019

Proofpoint

Stopping Email Fraud
sponsored by Proofpoint
WHITE PAPER: Email fraud has cost victims more than $12.5 billion between the end of 2013 and 2018, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 21 Jun 2019 | Published: 31 Jan 2018

Proofpoint

Fighting Fraud β€”the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Read on to learn how your organization can implement identity best practices without adding friction to any digital onboarding experience.
Posted: 23 May 2019 | Published: 23 May 2019

Onfido

Automation First: A Practical Approach to IAM
sponsored by Hitachi ID
WHITE PAPER: This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

A Holistic Approach To Identity And Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.
Posted: 11 Apr 2019 | Published: 23 Feb 2018

HID Global

Supporting Business Agility in a Connected World
sponsored by HID Global
WHITE PAPER: In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

HID Global

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security
sponsored by HID Global
WHITE PAPER: For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global
1 - 25 of 163 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement