IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 314 Matches Previous Page  |  Next Page
ACLs Are Not Enough - Achieving Zero Trust by Extending Least Privilege
sponsored by ShieldX
VIDEO: In this video, see how the application of ShieldX Least Privilege Access Control is extended to network Layer 7 to achieve zero trust security.
Posted: 14 Feb 2020 | Premiered: 14 Feb 2020

ShieldX

Privileged Access Management: Analyst Report
sponsored by Centrify Corporation
ANALYST REPORT: Privileged access management (PAM) is a critical security control, particularly in today’s increasingly complex IT environment. Security and risk management leaders must use PAM tools in a long-term strategy for comprehensive risk mitigation. Download this report for vendor comparisons that outline the strengths and weaknesses of PAM vendors.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Centrify Corporation

The IT Director's Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: When it comes to managing cybersecurity, IT leaders & their teams are at a disadvantage: As threat methods are increasing in frequency & complexity, security teams must ensure protection with limited resources. Download this checklist as you develop your cybersecurity strategy & make effective use of existing resources.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Arctic Wolf Networks, Inc.

Total Access in a Zero Trust Environment
sponsored by PortSys
RESEARCH CONTENT: With the rate at which technology is changing, traditional security models are growing ineffective at providing adequate protection. Organizations require a scalable approach that is effective for securing on-premise and remote users. In this article, take a closer look at the increasingly popular zero-trust model for total access control.
Posted: 29 Jan 2020 | Published: 23 Jan 2020

PortSys

Appian for Insurance: Underwriting Authority Management
sponsored by Appian
WHITE PAPER: For insurance companies, ensuring that underwriting authority information is correct, updated, and trusted is important to avoid financial risks. This white paper delves into advanced records management services, discussing how low-code platforms can help in the struggle to keep underwriting authority simple and secure. Read the paper here.
Posted: 27 Jan 2020 | Published: 27 Jan 2020

Appian

A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

Zero Trust Access Helps UK County Improve Productivity and Access Control
sponsored by PortSys
CASE STUDY: The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

PortSys

A CISO’s Guide to Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: Micro-segmentation is growing increasingly popular amongst organizations that operate within multi-cloud environments. It focuses on the workload-level, and only allows permissions based on what the specific task requires. Download this guide for a comprehensive checklist that can help take the pain out of micro-segmentation adoption.
Posted: 23 Jan 2020 | Published: 31 Oct 2018

ShieldX

Security Controls for Effective Micro-Segmentation
sponsored by ShieldX
WHITE PAPER: With cyberattacks becoming increasingly difficult to identify and mitigate, organizations shift towards Forrester’s Zero Trust Model to protect their post-perimeter environments against lateral movements. In this white paper, explore security controls and evaluation criteria for the foundational elements of your zero-trust strategy.
Posted: 23 Jan 2020 | Published: 30 Sep 2017

ShieldX

Mobile Verify
sponsored by Mitek Systems, Inc.
DATA SHEET: Through advanced machine-learning algorithms, identity verification enables businesses to authenticate their digital users’, empowering them to enhance customer experience and data security. Read this data sheet to explore the science behind Mitek’s Mobile Verify digital identity verification tool and how it works.
Posted: 22 Jan 2020 | Published: 22 Jan 2020


Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

Securing the workplace of the future
sponsored by Tehama
EBOOK: A stolen or compromised identity is at the heart of many of the major data breaches you read about in the news. With virtual access becoming the norm, ensuring protection for a borderless workplace is critical to maintaining a secure environment. In this white paper, explore 3 key best practices for securing your digital workforce.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tehama

Cisco Umbrella & Duo Security: Protect users and secure access to applications
sponsored by Cisco Umbrella
DATA SHEET: As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Cisco Umbrella

Cybersecurity Insights Report Ninth Edition
sponsored by AT&T Cybersecurity
RESOURCE: 5G is more than just an increase in speed; its rollout is expected to change the way organizations approach network and technology security. A recent study was conducted to uncover the potential impacts of 5G and the preparedness of enterprises. Read on to uncover the key insights from the research.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

AT&T Cybersecurity

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
RESOURCE: With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

PortSys

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys

How to Prevent Data Theft from Departing Employees
sponsored by ActivTrak
RESOURCE: When it comes to cybersecurity, many organizations look to bolster their defenses against external threats, while overlooking some of the internal threats posed by departing employees. In this article, uncover the 5 steps your organization should consider for protection from internal data theft.
Posted: 10 Dec 2019 | Published: 02 Dec 2019

ActivTrak

Preventing PeopleSoft Breaches
sponsored by Appsian
WHITE PAPER: Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Appsian

BeyondCorp for the Enterprise
sponsored by Banyan Security
WHITE PAPER: Banyan has interviewed 100s of security professionals across industry verticals and have proposed 4 new guidelines for security teams charged with deploying ZeroTrust and BeyondCorp initiatives. Read on to view the 4 guidelines.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Banyan Security

7 Considerations for Implementing Zero Trust
sponsored by Banyan Security
RESOURCE: Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Banyan Security

Zero Trust Remote Access Platform
sponsored by Banyan Security
PRODUCT OVERVIEW: Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.
Posted: 05 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

Newcomer Banyan Tackles Zero Trust with a Mesh-Based Approach to Multi-Cloud Security
sponsored by Banyan Security
ANALYST REPORT: In this 451 Research report, learn about Banyan’s new security offering that focuses on the authorization layer of a zero-trust platform, or what it calls a ‘zero trust continuous authorization framework.’
Posted: 03 Dec 2019 | Published: 03 Dec 2019

Banyan Security

The Evolution of Zero Trust
sponsored by Banyan Security
WHITE PAPER: As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.
Posted: 03 Dec 2019 | Published: 30 Nov 2019

Banyan Security
1 - 25 of 314 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info