IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 432 Matches Previous Page  |  Next Page
Assigning Risk Levels & Choosing Authentication Policies
sponsored by Identity Automation
EBOOK: Different types of employees carry different levels of risk. But how do you know the appropriate level of risk for any given employee? This resource reveals tactics for assigning appropriate risk levels and choosing authentication policies to ensure successful security within your enterprise.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Dispelling the Myths of Single Sign-On Portals vs. Full-Featured IAM Systems
sponsored by Identity Automation
EBOOK: The average enterprise now relies on 935 different cloud applications, according to Netskope's Cloud Report. Utilize this resource to decide whether or not your enterprise needs an IAM approach that goes beyond single sign-on to effectively secure your cloud applications.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Enabling Healthcare with Trusted Access
sponsored by Duo Security
WEBCAST: Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for change and improvement in the security landscape within the healthcare industry.
Posted: 18 Jan 2018 | Premiered: Jan 18, 2018

Duo Security

Overcome the Top 5 Cloud Migration Obstacles with IAM
sponsored by Identity Automation
EBOOK: According to an IDG survey, 45% of organizations have already moved their applications and computing infrastructure to the cloud. Explore this resource to gain insight into why IAM should be the focal point of your cloud migration strategy.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

4 Reasons Why IAM Should Be the Core of Your Security Program
sponsored by Identity Automation
EBOOK: As businesses embrace BYOD policies and more employees work remotely, companies need to change the way they view the threat landscape. Explore this e-book to uncover how to increase security in a perimeter-less global business environment by advancing IAM.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

5 Signs You Need to Upgrade Your Legacy IA M System
sponsored by Identity Automation
WHITE PAPER: While 49% of business applications are now stored in the cloud, less than half of them are known or approved by the IT department, according to Ponemon Institute. This white paper reveals 5 signs you need to update your legacy identity and access management system.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Identity Automation

3 Types of Rogue Employees and How to Stop Them
sponsored by Identity Automation
WHITE PAPER: Employees pose the greatest threat to any organization and have the capability to cause egregious harm and costs through data breaches, insecure transactions, and cyber theft. This e-book reveals 3 types of employees who pose security risks and offers strategic approaches utilizing IAM for mitigating these risks and improving your security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

Securing the Modern Enterprise
sponsored by Duo Security
WHITE PAPER: The most difficult aspect of an enterprise to control is the human element. This white paper provides enterprises with strategic approaches for securing the enterprise and protecting against its weakest vulnerabilities.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

IAM as a Foundation for Your AWS Migration Strategy
sponsored by Identity Automation
WHITE PAPER: Using IAM as the foundation of your AWS migration can reduce complexity, smooth out the overall process, and help ensure a successful transition to the cloud. This white paper offers strategies for enhancing your AWS deployment with an IAM approach.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Identity Automation

Definitive Guide to Account Username Conventions
sponsored by Identity Automation
WHITE PAPER: One of the most important and the most challenging IAM configuration options is defining the company's username convention. This 23-page guide details how to significantly reduce the time required defining and standardizing the username convention method.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Identity Automation

Cybersecurity for Dummies
sponsored by Thycotic
WHITE PAPER: People are the number one target and cause of cybersecurity failures. Explore this 29-page For Dummies e-book to learn about cybersecurity, how to recognize and respond to threats, and how to protect your company.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Thycotic

Service Desk in Varde Eliminates Password-Related Calls
sponsored by Fast Pass Corp
WHITE PAPER: This case study explores how Varde Municipality implemented a password management strategy to overcome their issue of receiving password related calls.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

The Importance of the Facilitated Password Process for Enterprise Password Management
sponsored by Fast Pass Corp
WHITE PAPER: According to the 2017 Verizon Data Breach Investigations Report, 81% of hacking related breaches leveraged stolen or weak passwords. Explore this password management white paper to gain insight into securing your passwords to protect your organization from hackers.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

Password Management Case Study: London Metropolitan University
sponsored by Fast Pass Corp
CASE STUDY: This case study provides insight into how London Metropolitan University faced password management challenges and therefore implemented a strategy to manage user passwords securely both onsite and away from the university.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Fast Pass Corp

Password Management on the Service Desk
sponsored by Fast Pass Corp
WHITE PAPER: Frequently the impact of password management on the service desk is estimated to take up to between 20% and 35% of service desks total calls. This report details the impact password management has on companies as well as how organizations are implementing password management techniques.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Fast Pass Corp

4 Companies Seek Password Security Management
sponsored by Fast Pass Corp
CASE STUDY: Explore this case study to learn about how 4 companies implemented a password management strategy to improve their overall password security. Through this case study, uncover core benefits the companies experienced.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Fast Pass Corp

GDPR Infographic
sponsored by Fast Pass Corp
RESOURCE: According to the Verizon Data Breach Investigations Report, 63% of confirmed data breaches involved weak, default, or stolen passwords. Take a closer look at this IDC infographic to uncover strategies for improving your IAM approach to become GDPR compliant.
Posted: 29 Dec 2017 | Published: 29 Dec 2017

Fast Pass Corp

Omnichannel for Retail
sponsored by iovation, Inc.
WHITE PAPER: This resource explores the benefits of adopting multi-factor authentication strategies for mobile devices to improve security and enhance the user experience.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

iovation, Inc.

Get Compliant and Stay Compliant
sponsored by SailPoint Technologies
WHITE PAPER: There are now dozens of government and industry laws pertaining to security and privacy, forcing organizations to adhere to a complex series of requirements. This white paper outlines key requirements of compliance mandates and provides recommendations on how to build an effective identity management strategy to meet compliance requirements.
Posted: 15 Dec 2017 | Published: 15 Dec 2017

SailPoint Technologies

Market Pulse Survey
sponsored by SailPoint Technologies
WHITE PAPER: According to SailPoint Technologies' Market Pulse Survey, 3 in 5 respondents admitted they expect to be breached this year, but only 1/3 of them believe they won't even know when it happens. These survey results explore how enterprises are changing their approach to security, amid the evolving threat landscape of the largest breaches ever recorded.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

SailPoint Technologies

Are you Ready for Cloud-Based Identity Governance?
sponsored by SailPoint Technologies
EBOOK: Successfully managing the adoption of SaaS applications – and securely migrating to a cloud enterprise – requires identity governance. This resource details the importance of cloud-based identity governance and securely migrating to a cloud enterprise while still having full visibility across the IT infrastructure.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

SailPoint Technologies

Why Device Risk is an Essential Element for Your MFA Strategy
sponsored by iovation, Inc.
WEBCAST: Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.
Posted: 13 Dec 2017 | Premiered: Oct 31, 2017

iovation, Inc.

Identity Up in the Clouds
sponsored by SailPoint Technologies
EBOOK: As a result of the increase in cloud usage, many enterprises are facing challenges with running a hybrid environment, most importantly securing their users' access to all these apps. Explore this e-book to uncover how to effectively manage IAM within your cloud environments.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies

The Anatomy of a Data Breach
sponsored by SailPoint Technologies
WHITE PAPER: 43% of the time data breaches are directly caused by insiders, according to SailPoint Technologies. Explore this white paper to gain insight into the anatomy of data breaches through 4 phases to help protect your organization against falling victim to such attacks.
Posted: 12 Dec 2017 | Published: 12 Dec 2017

SailPoint Technologies
1 - 25 of 432 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement