IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 327 Matches Previous Page  |  Next Page
Privileged Account Governance and Incident Response
sponsored by One Identity
RESOURCE: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this video transcript, Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

One Identity

Stopping Email Fraud
sponsored by Proofpoint
WHITE PAPER: Email fraud has cost victims more than $12.5 billion between the end of 2013 and 2018, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 21 Jun 2019 | Published: 31 Jan 2018

Proofpoint

Mimecast Mobile: The Experience Employees Want With the Control You Need
sponsored by Mimecast
DATA SHEET: Access to information from anywhere is critical to increasing employee's productivity. However, without the appropriate security and controls in place, this can increase your risk of a breach. In this data sheet, learn how Mimecast Mobile allows employees to securely access the information they need.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Mimecast

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
PODCAST: In this podcast episode with two IAM experts from One Identity, learn more about privileged accounts and how you can block bad actors from accessing your company's data.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Webcast: Solutions for Privileged Account Resilience
sponsored by One Identity
WEBCAST: Tune into this informative webcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Podcast: Privileged Account Governance and Incident Response
sponsored by One Identity
PODCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Privileged Account Governance and Incident Response
sponsored by One Identity
WEBCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this webcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Solutions for Privileged Account Resilience
sponsored by One Identity
PODCAST: Tune into this informative podcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.
Posted: 12 Jun 2019 | Premiered: Jun 12, 2019

One Identity

Who Watches the Watchers?
sponsored by Forcepoint
VIDEO: Tune into this webcast as, Forcepoint Chief Scientist, Dr. Richard Ford, looks at analytic techniques that are effective at protecting information from those who already have legitimate access to it.
Posted: 11 Jun 2019 | Premiered: 11 Jun 2019

Forcepoint

Key Considerations for Deploying IAM and CIAM Software
sponsored by Optiv
EGUIDE: When properly implemented and in compliance with local security policies, identity access management software can serve as the center of any IT security strategy -- but it's important for IT pros to select the right platform for their organization. In this e-guide, explore key considerations for choosing both an IAM and a customer IAM software.
Posted: 10 Jun 2019 | Published: 05 Jun 2019

Optiv

Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY: Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

Episode 2: The Attack
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download this video to see how attackers use social engineering techniques to execute voice phishing (vishing) attacks.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

Episode 1: Good Jan, Bad Jan
sponsored by Proofpoint
WEBCAST: This security skit uses humor and real-world situations to inform end users about the risks related to the social engineering techniques and risky behaviors that can lead to successful business email compromise (BEC) attacks. Download the video to further explore the risks associated with unlocked PCs and poor password security.
Posted: 07 Jun 2019 | Premiered: Jun 7, 2019

Proofpoint

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Onfido

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 03 Jun 2019 | Published: 30 May 2019

Onfido

Identity Access Management: Enable Business Growth and Strength Security
sponsored by Optiv
RESOURCE: Breaches, compliance and digital transformation are 3 challenges organizations today are faced with. At the center of today's challenges are compromised identities. In this resource, learn how Optiv can strength your security by implementing a strategic approach to Identity Access Management.
Posted: 30 May 2019 | Published: 30 May 2019

Optiv

5 Steps For A Successful IAM Deployment
sponsored by Optiv
WHITE PAPER: Identity Access Management (IAM) is a complex and ever-shifting aspect of every organization's IT structure. Because of this complex nature, deploying an IAM program can be difficult. A successful deployment is often even harder to achieve. In this white paper, explore 5 steps to ensure your IAM deployment is successful.
Posted: 30 May 2019 | Published: 30 May 2019

Optiv

Key Considerations For Implementing an IAM System
sponsored by Onfido
EGUIDE: IT administrators have many features to choose from and requirements to meet when looking for an identity and access management (IAM) tool. In this e-guide, explore other key considerations for selecting and implementing the right IAM system in your organizations.
Posted: 30 May 2019 | Published: 28 May 2019

Onfido

The End of the Password?
sponsored by Onfido
EBOOK: Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.
Posted: 30 May 2019 | Published: 30 May 2019

Onfido

Single Sign-On with TeamViewer Tensor
sponsored by TeamViewer
RESOURCE: Enterprise remote access can enable your team to work from anywhere on any device, but can also make you more vulnerable to attackers. Learn about a cloud-based remote access management platform that has built-in security features like SSO to help keep you safe from attackers while maximizing productivity in this infographic.
Posted: 30 May 2019 | Published: 30 May 2019

TeamViewer

The End of the Password?
sponsored by Onfido
EGUIDE: Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.
Posted: 30 May 2019 | Published: 29 May 2019

Onfido

Protecting the Unprotectable with Next Generation Authentication
sponsored by Silverfort
VIDEO: Not trusting anyone by default, even those already inside the network perimeter, has to be the new reality. The security model of zero trust. In this webinar, learn why traditional MFA won't cope with zero trust requirements, why passwords are no longer a reliable factor of authentication, and more.
Posted: 28 May 2019 | Premiered: 21 May 2019

Silverfort

Maximizing Security Without Slowing Down the Business
sponsored by Silverfort
PRODUCT OVERVIEW: By verifying the true identity of users in response to threat alerts, Silverfort helps security teams ease alert fatigue by reducing the amount of false-positives. Download this solution brief to learn about step-up authentication.
Posted: 24 May 2019 | Published: 24 May 2019

Silverfort

Threat-Driven Multifactor Authentication (MFA)
sponsored by Silverfort
RESOURCE: In this solution brief, learn how Check Point and Silverfort have partnered to deliver dynamic threat-driven authentication. With this integration, any threat detected by Check Point is leveraged by Silverfort's policy engine to trigger step-up authentication in real-time.
Posted: 24 May 2019 | Published: 16 Mar 2018

Silverfort

Next-Generation Authentication for Financial Services
sponsored by Silverfort
PRODUCT OVERVIEW: In financial organizations, the use of legacy and internally-developed applications that are not supported by current MFA solutions creates significant security and compliance challenges. In this brief, learn how Silverfort's agentless MFA technology can seamlessly enforce MFA on access to legacy systems, IT infrastructure, IoT devices and more.
Posted: 23 May 2019 | Published: 23 May 2019

Silverfort
1 - 25 of 327 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement