IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 374 Matches Previous Page  |  Next Page
Bridging the Gap between Physical & Digital Identity
sponsored by Okta
WEBCAST: The separation of physical and digital work leaves IT systems vulnerable to physical security breaches. In this Oktane21 conference session from March 2021, learn about using Okta and Openpath to bridge the gap between physical and digital security, providing a frictionless and secure user experience regardless of where users are.
Posted: 28 May 2021 | Premiered: May 21, 2021

TOPICS:  Authentication
Okta

Bridging the Gap between Physical & Digital Identity
sponsored by Okta
WEBCAST: The separation of physical and digital work leaves IT systems vulnerable to physical security breaches. In this Oktane21 conference session from March 2021, learn about using Okta and Openpath to bridge the gap between physical and digital security, providing a frictionless and secure user experience regardless of where users are.
Posted: 28 May 2021 | Premiered: May 28, 2021

TOPICS:  Authentication
Okta

Axiad helps healthcare provider step up its fight to protect member and company information
sponsored by Axiad
CASE STUDY: Inside this case study, learn how Axiad guided a healthcare provider’s team in its decision to select a PKI solution: one of only 2 methods that meet NIST-63-2 Level 4’s highest available security level.
Posted: 19 May 2021 | Published: 19 May 2021

TOPICS:  Authentication
Axiad

The Rise of Credential Stuffing Attacks
sponsored by ForgeRock
QSO INCENTIVE: Take a brief survey to unlock this expert guide on the basics of credential theft, credential stuffing attacks, and ways you can detect & combat them to keep employee accounts secure.
Posted: 12 May 2021 | Published: 12 May 2021

TOPICS:  Authentication
ForgeRock

The Ultimate Guide to Securing Today’s Remote Workforce
sponsored by ForgeRock
EBOOK: The Ultimate Guide to Securing Today's Remote Workforce leverages exclusive insight from Gartner and TechTarget to provide you with a better understanding of the operational and cybersecurity challenges and opportunities that were introduced as a result of the need to enable remote workforces. Take this survey to access this e-guide.
Posted: 12 May 2021 | Published: 12 May 2021

TOPICS:  Authentication
ForgeRock

IT Priorites 2020 - After Covid 19 security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Universal Directory. Create one world.
sponsored by Okta
EBOOK: Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

Zero Trust for Sustainable Data Discovery
sponsored by 1Touch.io
WHITE PAPER: View this white paper to learn how your organization can achieve a Zero Trust Framework with 1touch.io’s network-first approach.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

TOPICS:  Authentication
1Touch.io

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Mar 2021 | Published: 01 May 2021

TechTarget

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation

Rules to Stop the 8 Types of Transfer Fraud Losses
sponsored by Feedzai
RESOURCE: Fraud prevention is, by design, a broad term that encompasses any and all efforts to thwart the 8 types of transfer fraud loss. This infographic defines each of these fraud subtypes and offers insight into creating a set of rules for preventing each of them (with examples) – read on to get started.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Feedzai

HOW TO PREVENT PAYMENTS FRAUD AMID GLOBAL DISRUPTION
sponsored by Feedzai
EBOOK: The financial services industry was heavily disrupted by the coronavirus outbreak – but this didn’t mean that hackers and fraudsters were going to take it easy on them. This e-book, How to Prevent Payments Fraud amid Global Disruption, highlights today’s security challenges, best practices and future opportunities facing the financial industry.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Feedzai

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Feb 2021 | Published: 01 May 2021

TechTarget

Introducing NetMotion SDP
sponsored by NetMotion
RESOURCE: Security teams need uncompromised visibility across all devices, no matter where they are or what network they’re on. In this vein, they also need to prevent unwanted lateral movement across networks by granting access only to necessary applications. Engage this interactive product page where you can absorb the ins and outs of NetMotion SDP.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

NetMotion

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Keeping Remote Workers Safe Webcast
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

Enterprise VPN Software Solutions
sponsored by NetMotion
RESOURCE: Modern approaches to remote access such as SDP are emerging, but most enterprises will continue to need a robust VPN that meets the needs of the increasingly mobile workforce. As such, NetMotion has designed a VPN with a focus in optimizing experience for mobile workers. Access this product page to learn more.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

NetMotion

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security
1 - 25 of 374 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences