IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 387 Matches Previous Page  |  Next Page
SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The IAM Trends That Matter Most – 2021 edition
sponsored by TechTarget
RESOURCE: In this e-guide, our experts walk you through the IAM market, including trends, challenges, and best practices.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Data Encryption and Authentication for Cloud Storage
sponsored by ESET
EGUIDE: As organizations migrate to the cloud, they’re choosing cloud storage as a more efficient and cost-effective method to store their data. But with this transition comes security risks that cannot be ignored – cloud storage is more vulnerable. Dive into this e-guide to learn how encryption and authentication can help mitigate these risks.
Posted: 22 Mar 2021 | Published: 16 Mar 2021

ESET

Infographic: The Maturity Of Zero Trust In Europe.
sponsored by Okta
RESOURCE: Zero Trust is driving European organizations to enhance their security. In an Okta poll, 93% of said organizations say they’ve implemented at least one security solution mapped to a zero-trust strategy. For more data on how your peers are adopting zero trust to protect their apps, download this infographic exhibiting European zero-trust trends.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Okta

How To Secure Your Vpn – And Then Rethink It Entirely
sponsored by Okta
RESOURCE: For years, VPNs have allowed employees to securely access apps, databases and email systems outside of the corporate network. But as companies enable distributed work from everywhere, VPNs are being reconsidered. Download this infographic to learn how a 4-stage approach to zero-trust security can help you phase out your VPN.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Okta

Okta Video 3: Securing Complex On-Prem Apps With Okta
sponsored by Okta
WEBCAST: Many organizations are running complex apps – such as Oracle E-Business Suite, SAP, PeopleSoft, and Oracle Hyperion – holding critical data that require modern protection. Access this webinar to learn how these complex apps should be protected, including best practices for a secure implementation and migrating off of legacy approaches.
Posted: 10 Mar 2021 | Premiered: Mar 10, 2021

Okta

Okta Video 1: NetMotion + Okta Integration Webinar
sponsored by Okta
WEBCAST: Okta’s Identity Cloud range of products are known for adaptive multi-factor authentication (MFA) and single sign-on (SSO). NetMotion’s mobile-centric platform, a VPN and a software-defined perimeter (SDP), is built on a zero-trust architecture. Watch this webinar to learn how they integrate to help you keep your remote workforce secure.
Posted: 10 Mar 2021 | Premiered: Mar 10, 2021

Okta

Retiring Web Access Management (WAM)
sponsored by Okta
DATA SHEET: Many organizations have adopted web access management (WAM) solutions to secure access to web applications on-premises. But with the emergence of SaaS, mobile apps and IaaS, enabling access to all systems and users has broken the WAM security model. Take a look at this data sheet to learn how to modernize identity management.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

Universal Directory: Create One World.
sponsored by Okta
EBOOK: Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

Zero Trust for Sustainable Data Discovery
sponsored by 1Touch.io
WHITE PAPER: View this white paper to learn how your organization can achieve a Zero Trust Framework with 1touch.io’s network-first approach.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

TOPICS:  Authentication
1Touch.io

Burdens of Homegrown Customer Identity that Hinder Digital Transformation
sponsored by Okta
WHITE PAPER: When your organization is building to scale, you must place your customers first. Customer identity and access management (CIAM) are the front door to your company’s digital experiences. But many are still using homegrown CIAM, and this puts up roadbloacks to transformation. Dive into this white paper to see why your CIAM may need an update.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Okta

Use Group Rules to Automate & Granularly Manage Access
sponsored by Okta
WEBCAST: Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.
Posted: 01 Mar 2021 | Premiered: Mar 1, 2021

Okta

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

MOBILE AUTHENTICATION: The Future Of Mobile Security And User Engagement
sponsored by Infobip
WHITE PAPER: Read this report to discover the numerous mobile security threats businesses are facing and learn how a variety mobile authentication and security strategies can be used to mitigate these risks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Infobip

Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

ComputerWeekly.com

Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT: Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

IDology

Rethinking Reliance on Active Directory
sponsored by Okta
DATA SHEET: In the late 90s and early 00s, Active Directory (AD) was the primary method for identity management, and it worked well. However, times have changed, and so have identity needs and IT ecosystems. It’s time to rethink AD – read this data sheet to get started.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

Okta + HYPR: Secure, Passwordless Authentication for Employees and Consumers
sponsored by Okta
DATA SHEET: Passwords present a significant weakness in an organization’s security architecture, and cybercriminals are keen on exploiting this weakness. Read this data sheet to learn how Okta and HYPR are enabling organizations to eliminate passwords in favor of passwordless authentication methods.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

The Guide To Just-In-Time Privileged Access Management
sponsored by BeyondTrust Corporation
EGUIDE: Organizations employing effective privileged access management (PAM) programs are often familiar with the philosophy of providing “just enough” access. This e-guide takes “just enough” access to the next level. Read The Guide To Just-In-Time Privileged Access Management to learn more.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BeyondTrust Corporation

Rules to Stop the 8 Types of Transfer Fraud Losses
sponsored by Feedzai
RESOURCE: Fraud prevention is, by design, a broad term that encompasses any and all efforts to thwart the 8 types of transfer fraud loss. This infographic defines each of these fraud subtypes and offers insight into creating a set of rules for preventing each of them (with examples) – read on to get started.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Feedzai

How to Prevent Payments Fraud amid Global Disruption
sponsored by Feedzai
EBOOK: The financial services industry was heavily disrupted by the coronavirus outbreak – but this didn’t mean that hackers and fraudsters were going to take it easy on them. This e-book, How to Prevent Payments Fraud amid Global Disruption, highlights today’s security challenges, best practices and future opportunities facing the financial industry.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Feedzai

THE CYBERARK PRIVILEGED ACCESS SECURITY SOLUTION FOR U.S. FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International

A RISK-BASED APPROACH TO INSIDER THREAT DETECTION FOR FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International
1 - 25 of 387 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences