IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 293 Matches Previous Page  |  Next Page
You Can Get IAM Right
sponsored by One Identity
BOOK: In this e-book created exclusively for the RSA Conference, discover the most pressing IAM issues faced by virtually every organization and actionable, affordable and sustainable approaches to the IAM challenges you face.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

One Identity

The Breach Prevention Playbook
sponsored by One Identity
WHITE PAPER: Today's breaches leave us knowing that IAM and password security is more important than ever before. In this e-book, discover IAM practices and technologies that can bolster your chances of not only surviving the inevitable breach but enabling your organization to emerge with minimal damage.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

One Identity

G Suite Security and Trust
sponsored by Dito
EBOOK: In this e-book, learn how the robust security features in the G Suite are designed to protect your business from threats like major spear-phishing attacks. These features include cutting-edge cloud security, encryption, access and authentication and more.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Dito

Meeting Corporate Requirements for Comprehensive Security for Users and Their Devices
sponsored by Lenovo
RESOURCE: Perhaps the single most common point of attack is user devices. With inconsistent security tools and many PCs running insecure software stacks, there are numerous ways these devices are compromised. In this article, learn how combining more secure operating systems and devices that automate key security processes can help protect your organization.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Lenovo

How to Align with the NIST Cybersecurity Framework
sponsored by ForeScout
EBOOK: Adopting the NIST framework provides organizations with a structure to outline their current state of cybersecurity and strengthen their overall security. In this e-book, explore how Forescout's SilentDefense can facilitate adoption of the 3-part NIST Cybersecurity Framework.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ForeScout

Overcoming Payment Declines
sponsored by Riskified
WHITE PAPER: In the cutthroat eCommerce environment, any overlooked leak in the payment funnel can be devastating. In this white paper, learn more about payment declines including what they are, why it's hard to measure their impact and where they are most likely to occur.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Riskified

Security and Efficiency Benefits Realized With HP MPS and HP Access Control
sponsored by HP
CASE STUDY: Security experts are advising and clients are demanding that law firms protect their confidential data with the highest level of IT security solutions. In this case study, learn how one legal firm chose to enhance print management and security through a HP Managed Print Services solution.
Posted: 13 Mar 2019 | Published: 31 Jan 2017

HP

Security vs. Mobility in Today's Workplace
sponsored by HP
JOURNAL ARTICLE: BYOD isn't going anywhere, so it's up to IT to make sure mobile security practices are as painless as possible. In this article, learn how different forms of authentication can help your organization balance security vs. mobility today.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

HP

Disputing Chargebacks
sponsored by Riskified
WHITE PAPER: In the competitive world of eCommerce, online retailers must provide an optimal customer experience or risk losing business. But many are seeing their hard-earned revenue fall victim to credit card chargebacks. In this white paper, learn how to differentiate between unauthorized and authorized transactions to successfully beat chargeback abuse.
Posted: 13 Mar 2019 | Published: 30 Jun 2017

Riskified

5 Must Haves for your Access Solution
sponsored by Akamai Technologies
RESOURCE: Download this infographic for five demands you should make of an updated, comprehensive application access solution.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Akamai Technologies

Building a Foundation of Trust for an Expanding PKI Ecosystem Architecture
sponsored by nCipher
WHITE PAPER: Download this white paper to learn about the security risks of typical enterprise and government Public key infrastructures (PKIs) and how more high-value business applications and devices increasingly depend on trusted digital credentials.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

nCipher

Revitalizing Privacy and Trust in a Data-Driven World
sponsored by Micro Focus & PwC
RESEARCH CONTENT: Many organizations worldwide are not doing all they can to protect privacy. Privacy risk management needs reinvigoration and stronger integration with cybersecurity.This report draws on key findings from the 2018 Global State of Information Security Survey to offer 9 tips on revitalizing privacy and trust in a data-driven world.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Micro Focus & PwC

Ensure That Biometric Authentication Technologies Are Secure
sponsored by Onfido
EGUIDE: Biometrics are often perceived as being more secure than traditional passwords. However, this is not always the case. In this e-guide, learn how researchers at the University of North Carolina at Chapel Hill achieved authentication using a virtual reality model of an authorized user's face.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Onfido

The Five Most Creative Ways that Organizations are Using Advanced Authentication
sponsored by Micro Focus
VIDEO: In this webinar, hear from identity and access management experts, Kent Purdy and Troy Drewry, about the new ways organizations are using the latest authentication technologies and how they're preparing the future.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Micro Focus

The Power of Trust between Businesses and Consumers
sponsored by Micro Focus
WHITE PAPER: From logging in to logging out and everything in between, modern authentication enables a positive customer interaction with your digital systems. In this white paper, learn how you can leverage today's technologies, such as multifactor authentication, to strike a balance between security, convenience, and long-term opportunities.
Posted: 04 Mar 2019 | Published: 31 Jul 2018

Micro Focus

The Journey to IAM Success
sponsored by One Identity
WHITE PAPER: IAM is becoming a valuable enabler but, planning and deploying IAM is not without its challenges. In this white paper, discover first-hand opinions, lessons learnt and recommendations from senior peers in several global brands who have experienced the trials and triumphs of implementing their own IAM programs.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

One Identity

Biometrics: Learn the advantages and disadvantages
sponsored by Onfido
EGUIDE: When used in conjunction with other authentication factors, like passwords or tokens, biometric authentication methods have the potential to improve security as well as the user experience. In this e-guide, learn about the advantages of biometrics.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Onfido

User Risk Report 2018
sponsored by Proofpoint
RESEARCH CONTENT: Users' personal cybersecurity habits are carrying over into work hours. And, often, infosecurity teams are overestimating end users' understanding of fundamental cybersecurity best practices. In this research report, explore key survey findings that address working adult's cybersecurity knowledge.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Proofpoint

A Guide To Fraud In The Real World
sponsored by Splunk Services UK Ltd
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk Services UK Ltd

5 Identity Pitfalls to Avoid
sponsored by Onfido
RESOURCE: Identity theft accounts for half of all reported fraud in the UK. And if you fail to catch that fraud, the cost to your business – both reputational and financial – can be catastrophic. Do you know the 5 most common identity pitfalls that businesses fall afoul of – and crucially, how to avoid them?
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido
1 - 25 of 293 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement