IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 291 Matches Previous Page  |  Next Page
Psychology of Passwords
sponsored by LogMeIn (Go To Connect)
EBOOK: PH
Posted: 11 Nov 2021 | Published: 11 Nov 2021

TOPICS:  Authentication
LogMeIn (Go To Connect)

The 3rd Annual Global Password Security Report
sponsored by LogMeIn (Go To Connect)
EBOOK: PH
Posted: 11 Nov 2021 | Published: 11 Nov 2021

TOPICS:  Authentication
LogMeIn (Go To Connect)

Finding a Password Management Solution for Your Business
sponsored by LogMeIn (Go To Connect)
EBOOK: PH
Posted: 11 Nov 2021 | Published: 11 Nov 2021

TOPICS:  Authentication
LogMeIn (Go To Connect)

From Passwords to Passwordless
sponsored by LogMeIn (Go To Connect)
EBOOK: PH
Posted: 11 Nov 2021 | Published: 11 Nov 2021

TOPICS:  Authentication
LogMeIn (Go To Connect)

Frictionless Authentication Enabled Using Behavioral Biometrics
sponsored by BehavioSec
CASE STUDY: In this case study, a multinational tech company with an increasing number of distributed workers was faced with the challenge of ensuring that their data security was scalable yet globally secure. Read on to learn why they landed on frictionless authentication using behavioral biometrics.
Posted: 14 Oct 2021 | Published: 14 Oct 2021

TOPICS:  Authentication
BehavioSec

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 04 Oct 2021 | Published: 12 Jun 2019

TechTarget

Implementing a Zero-Trust Approach to Network Security
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 04 Oct 2021 | Published: 04 Feb 2020

TechTarget

The Reality of IAM and Blockchain
sponsored by TechTarget
RESOURCE: You've been chosen to participate in our Identity and Access Management Research Program! By participating in the questionnaire and sharing your valuable cybersecurity insights, you'll gain FREE access to our whole IAM library. We regularly add content, so you'll always be up-to-date on the latest trends, insights, technologies & data.
Posted: 03 Oct 2021 | Published: 02 Nov 2021

TechTarget

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Axiad helps healthcare provider step up its fight to protect member and company information
sponsored by Axiad
CASE STUDY: Inside this case study, learn how Axiad guided a healthcare provider’s team in its decision to select a PKI solution: one of only 2 methods that meet NIST-63-2 Level 4’s highest available security level.
Posted: 19 May 2021 | Published: 19 May 2021

TOPICS:  Authentication
Axiad

IT Priorites 2020 - After Covid 19 security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: We've selected you to participate in our Identity and Access Management Research Program! By participating in the questionnaire and sharing your cybersecurity insights, you'll gain FREE access to our whole IAM library. Act now before this offer expires.
Posted: 02 Apr 2021 | Published: 28 Aug 2021

TechTarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Burdens Of Homegrown Customer Identity That Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Mar 2021 | Published: 01 May 2021

TechTarget

3 Threat Vectors Addressed By Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

MOBILE AUTHENTICATION: The Future Of Mobile Security And User Engagement
sponsored by Infobip
WHITE PAPER: Read this report to discover the numerous mobile security threats businesses are facing and learn how a variety mobile authentication and security strategies can be used to mitigate these risks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Infobip

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Feb 2021 | Published: 01 May 2021

TechTarget

The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Axis Case Study: Cardenas Markets Case Study / 1 Prabash Coswatte, Former Ciso (Cardenas) How Axis Keeps A Grocery Chain Well-Stocked And Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

Iot Platform Leader Armis Eliminates Dependency On Vpn Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Axis Security Video
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

On The Radar: Axis Security Takes A Different Approach To Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security
1 - 25 of 291 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences