IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication White Papers (View All Report Types)
1 - 25 of 180 Matches Previous Page  |  Next Page
Credential stuffing attacks: What they are and how to combat them
sponsored by Auth0
WHITE PAPER: Credential stuffing attacks are one of the most common types of large-scale cyberattacks today. In fact, 29% of data breaches in 2019 involved the use of stolen credentials. So how can you combat them? Download this white paper for everything you need to know.
Posted: 20 May 2020 | Published: 20 May 2020

Auth0

Securing Your Remote Employees with Cloud-Based Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Given the sudden and dramatic shift towards working from home, organizations have had to quickly enable their employees with remote access to the network. This buyer’s guide is designed to help determine which cloud-based authentication tool is best fit to meet your organization’s security needs and your employee’s operational requirements.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

SASE Series, Part 2: The Security View
sponsored by Hughes Network Systems
WHITE PAPER: A term coined by Gartner, Secure Access Service Edge (SASE) is an approach to network security designed to be the successor to data centers as organizations shift their data and endpoints to the cloud. In this blog post, dive deeper into the SASE approach, the growing attack surface, and its relationship with zero trust.
Posted: 07 May 2020 | Published: 30 Apr 2020

Hughes Network Systems

Zero Trust Evaluation Guide for the Workforce
sponsored by Duo Security
WHITE PAPER: To meet the scalability and security needs of today’s distributed business environments, organizations are adopting a zero-trust approach to manage access to sensitive data. In this white paper, take a look at the process of establishing secure trusted access from your users and their devices to work applications.
Posted: 04 May 2020 | Published: 04 May 2020

Duo Security

Omdia Market Radar: Zero-Trust Access
sponsored by Cloudflare
WHITE PAPER: Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.
Posted: 04 May 2020 | Published: 17 Mar 2020

Cloudflare

Duo Security's Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
WHITE PAPER: As passwords grow increasingly ineffective, new ways of authenticating users and managing identities are needed to ensure the protection of sensitive data. In this evaluation guide, learn the criteria for customizing your evaluation process and discover how to assess the efficacy of a two-factor authentication tool.
Posted: 01 May 2020 | Published: 01 May 2020

Duo Security

Advanced Authentication Buyers Guide
sponsored by HID Global
WHITE PAPER: With cyberattacks targeting credentials on the rise, it’s become paramount to include authentication and other identity management tools to your security program. This buyers guide identifies key considerations for organizations to look at when selecting an advanced authentication offering and vendor. Read on to get started.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

HID Global

A Comprehensive Guide to Authentication Technologies and Methods
sponsored by Thales
WHITE PAPER: Given the number of vectors being targeted by hackers, organizations are opting for a variety of focused tools based on need rather than an all-in-one approach to protect their digital identities. Read this comprehensive guide to learn more about the key methods and challenges surrounding authentication.
Posted: 28 Apr 2020 | Published: 31 Mar 2020

Thales

Protecting O365 and Microsoft Environments with Thales’ SafeNet Trusted Access
sponsored by Thales
WHITE PAPER: Organizations are shifting from traditional environments to cloud infrastructures, and security needs change along with migration. In this white paper, discover access challenges in cloud environments and explore how the capabilities of SafeNet Trusted Access, Thales’s cloud-based access management and authentication service, can help.
Posted: 28 Apr 2020 | Published: 31 Mar 2020

Thales

The Latest Trends in Advanced Authentication Solutions
sponsored by HID Global
WHITE PAPER: It’s estimated that the cost of breaches, identity theft and other cybercrimes will reach $6 trillion by 2021, doubling their cost from 2015. In order to combat these threats, organizations are embracing identity and access management (IAM) to protect sensitive data. Read on to learn more about the latest IAM threats and trends.
Posted: 27 Apr 2020 | Published: 27 Jan 2020

HID Global

Digital Identity Proofing How to Verify Identities Remotely and Securely
sponsored by Entrust, Inc.
WHITE PAPER: In response to the recent surge of remote workers and online shoppers, organizations are having to take measures to ensure their environments are fit to secure the growing volume of users while maintaining experience. Read this white paper to learn more about an effective and scalable approach – identity proofing.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Entrust, Inc.

Application Access Redefined: Managing the Modern Workforce Application
sponsored by Akamai Technologies
WHITE PAPER: Many businesses across the globe are experiencing a sudden increase in remote users. But traditional VPN setups simply weren't scoped for so many off-site workers. Read this paper to understand the modern workforce's access requirements, the limits of traditional access technologies, and zero-trust access best practices.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Akamai Technologies

Passwordless Authentication: How Giving Up Passwords Can Improve Security
sponsored by Thales
WHITE PAPER: Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI
sponsored by Thales
WHITE PAPER: In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.
Posted: 23 Apr 2020 | Published: 07 Apr 2020

Thales

Securely Maintain Business Continuity with A Remote Workforce
sponsored by Cybereason
WHITE PAPER: In response to social distancing recommendations, organizations have had to rapidly enable their entire staff to work remotely. However, such a dramatic shift can often lead to security oversights, which result in vulnerabilities. Read on to unlock a checklist and ensure your organization didn’t miss any vital preparation steps.
Posted: 20 Apr 2020 | Published: 17 Mar 2020

Cybereason

It’s Time to Treat Your Organisation like your Smartphone
sponsored by SailPoint Technologies
WHITE PAPER: Traditional passwords are ill-equipped to be a standalone security measure. Today, most of our smartphones have evolved beyond passwords to include biometric authentication – so why haven’t organizations followed suit? Read on to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

SailPoint Technologies

Creating an Identity-aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: As organizations continue to embrace transformative technologies, cyberattackers have discovered that the most successful and disruptive way to gain entry to your infrastructure is through your users. This white paper takes a closer look at the implications of insider threats and highlights how identity management may be able to help.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

SailPoint Technologies

5 Myths About Identity Governance
sponsored by SailPoint Technologies
WHITE PAPER: As IT environments grow more distributed and cyberattacks become more complex, organizations have begun to embrace identity governance to combat these threats. However, there are a lot of misconceptions surrounding this approach. This white paper clears the air by examining the top 5 identity governance myths.
Posted: 15 Apr 2020 | Published: 15 Apr 2020

SailPoint Technologies

Zero Trust’s Blind Spot: How Proactive Cyber Hygiene Preserves Zero Trust
sponsored by Automox
WHITE PAPER: Although zero-trust has grown in popularity, it should only serve as a piece of the cybersecurity puzzle rather than a standalone solution. In this white paper, discover why organizations should look to make widespread security improvements in order to fill in the gaps of zero-trust and get the most out of their security tools.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


Work from Home: An Application and Identity Management Guide
sponsored by EvolveIP
WHITE PAPER: Identity and access management (IAM) has enabled IT professionals to maintain security at scale, allowing organizations to continue their digital transformations. In this white paper, take a closer look into the methods and facets that make up IAM, as well as how to integrate remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Remote Work Considerations: Securing the New Corporate Network
sponsored by EvolveIP
WHITE PAPER: Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Getting Customer IAM Right
sponsored by Ping Identity Corporation
WHITE PAPER: For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Ping Identity Corporation

The Perimeter: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Identity and access management (IAM) is growing in popularity as a scalable and pragmatic security approach. This white paper highlights how IAM works, discusses the challenges to adopt this approach and provides IAM best practices to help you get started.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

F5 Networks

Consumer Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.
Posted: 02 Apr 2020 | Published: 26 Sep 2019

Ping Identity Corporation

Workforce Authentication Authority
sponsored by Ping Identity Corporation
WHITE PAPER: Read this white paper to gain a deeper understanding of the benefits of a workforce authentication authority, its essential capabilities, and the use cases it can support.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Ping Identity Corporation
1 - 25 of 180 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info