IT Management  >   Systems Operations  >   Security  >  

AAA

RSS Feed   
ALSO CALLED: Authentication, Authorization and Accounting, 3A, Access Authentication and Authorization, Administration (Security), Authentication, Authorization, and Accounting
DEFINITION: Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. These combined processes are considered important for effective network management and security.As the first process, authentication provides a way of identifying a  … 

AAA definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
AAA Reports
1 - 25 of 312 Matches Previous Page  |  Next Page
2018 Data Security Confidence Index Report
sponsored by Gemalto
RESOURCE: Uncover some key findings from both IT decision makers and consumers about the security of their most sensitive corporate data. Read on to see how your organization could benefit from a change in security measures.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

TOPICS: 
Gemalto

2018 Identity and Access Management Index Report
sponsored by Gemalto
RESEARCH CONTENT: According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a look at this report to learn about where organizations stand in terms of IAM and how they plan to augment security in the near future.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

TOPICS: 
Gemalto

5 Identity Pitfalls to Avoid
sponsored by Onfido
RESOURCE: Identity theft accounts for half of all reported fraud in the UK. And if you fail to catch that fraud, the cost to your business – both reputational and financial – can be catastrophic. Do you know the 5 most common identity pitfalls that businesses fall afoul of – and crucially, how to avoid them?
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

A Buyer's Guide to Online Identity Verification
sponsored by Jumio
WHITE PAPER: Because of cybercriminals and routine data breaches, trust is in increasingly short supply. This resource reveals how to evaluate vendors in the emerging trusted identity as a service space.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

TOPICS: 
Jumio

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

A Guide To Fraud In The Real World
sponsored by Splunk Services UK Ltd
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Splunk Services UK Ltd

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TOPICS: 
SearchSecurity.com

Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 20 Apr 2018 | Published: 16 Aug 2017

TOPICS: 
Gemalto

ALTR's Transformational, Blockchain-Based Data Security Platform Neutralizes the Privacy and Breach Exposures Created by the People Inside of Networks.
sponsored by ALTR
RESOURCE: Data risk is a part of almost every urgent technology conversation in the enterprise. Most issues are a result of the humans that are inextricable parts of our networks. Fortunately, the ALTR platform reduces data risks to virtually zero. In this white paper, learn how ALTR's platform provides visibility control and protection over valuable data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
ALTR

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

TOPICS: 
SafeNet Asia Ltd

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

TOPICS: 
Enginess

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

TOPICS: 
SafeNet, Inc.

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

TOPICS: 
Global Knowledge

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

TOPICS: 
Juniper Networks, Inc.

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

TOPICS: 
Global Knowledge

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

TOPICS: 
Imprivata

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TOPICS: 
Oracle Corporation UK Ltd

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

TOPICS: 
HID Global

Adaptive Access Management: An ROI Study
sponsored by Oracle Corporation
WHITE PAPER: Security solutions must verify and provide assurance that those requesting access are indeed who and what they say they are. This paper walks through detailed return-on-investment (ROI) calculations based on real customer interviews, and guides you in computing cost savings with adaptive access management.
Posted: 31 Mar 2011 | Published: 01 Sep 2010

TOPICS: 
Oracle Corporation

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

TOPICS: 
Intel

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

TOPICS: 
HYPR

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

TOPICS: 
SearchSecurity.com

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

TOPICS: 
Ping Identity Corporation

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

TOPICS: 
HYPR
1 - 25 of 312 Matches Previous Page    1 2 3 4    Next Page
Browse by Report Type:
AAA White Papers | AAA Multimedia | AAA IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement