IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 411 Matches Previous Page  |  Next Page
The API Security Maturity Model
sponsored by Curity AB
EBOOK: API security has become a forefront issue for modern enterprises. Many API security implementations exist, but not all are effective. How can you ensure that your APIs are mature and secure? Download The API Security Maturity Model, which reframes the degrees of web service development maturity through a security lens.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

Online Identity and the Digital Economy of Tomorrow
sponsored by Pipl
EGUIDE: Identity verification has evolved from traditional methods – which required the presence of government-issued documents – towards digital, multi-layered methods. Read this e-guide for an in-depth analysis of the challenges of today’s environments and explore the emerging trends shaping the future of identity verification.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Pipl

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

OAuth and OpenID Connect - What's Next?
sponsored by Curity AB
WEBCAST: The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API ready for a remote workforce. Watch this webcast to see why this matters now.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

Curity AB

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

Introducing NetMotion SDP
sponsored by NetMotion
RESOURCE: Security teams need uncompromised visibility across all devices, no matter where they are or on what network. In this vein, they also need to prevent unwanted lateral movement across networks by granting access only to necessary applications. Engage this interactive product page where you can absorb the ins and outs of NetMotion SDP.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

NetMotion

Okta + Netskope + CrowdStrike + Proofpoint: Securely Enable Remote Work at Scale
sponsored by Okta
DATA SHEET: Security and access challenges have been magnified by the massive global shift towards remote work. Read this data sheet to see how Okta, Netskope, Crowdstrike and Proofpoint (also known as the Spectra Alliance) combine their efforts to enable organizations to securely enable remote work at scale.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

Pipl: The Online Identity Information Company
sponsored by Pipl
VIDEO: Digital identities are critical for interacting in today’s connected world, and the need to secure and manage these identities has never been higher. Watch this short video to learn more about the state of identity management and the role of Pipl in this global shift.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Pipl

The Neo-Security Architecture
sponsored by Curity AB
WHITE PAPER: The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Curity AB

Adapt to Long-Term Remote Work with Adaptive Access Policies
sponsored by Okta
VIDEO: Last year, organizations scrambled to enable their employees to work remotely – but how are organizations preparing for reality of a decentralized workforce for the long term? Watch this webinar to learn more about sustainable best practices for securing and enabling a remote workforce.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Okta

Surviving Beyond the New Normal: It's More than Securing Your Remote Workers
sponsored by Okta
WEBCAST: In today’s organizations, directory structures need to be able to handle quick moves to new cloud applications and other systems. This means you need top-of-the-line identity management. Watch this webinar to get a clear-eyed view of the stresses these new requirements put on Azure AD and how Okta’s modern identity platform may be able to help.
Posted: 14 Jan 2021 | Premiered: Jan 14, 2021

Okta

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

How to Prepare Your Remote Workforce for Success
sponsored by Okta
EBOOK: Learn how to keep your hybrid workforce running efficiently by ensuring remote authentication is secure and frictionless.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Okta

Axis Keeps Cardenas Markets Well-Stocked & Well-Protected
sponsored by Axis Security
CASE STUDY: For years, Cardenas Markets, a grocery store chain, used traditional VPNs as their preferred method of provisioning access to their data. However, while this approach provided their partners with secure access, it failed to allow effective control. Read this case study to see how Axis helped Cardenas to revamp their access management program.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

Axis Security

IAM: Globalization & Large-Scale Enterprise
sponsored by IC Consult
WHITE PAPER: A growing number of workloads and IT services are moving to the cloud, and IAM is no exception. Moving IAM to the cloud helps avoid the integration, management and licensing complexity of hybrid IT environments (some workloads running on-prem, others in parallel in the cloud). Download this white paper to explore Identity-as-a-Service (IDaaS).
Posted: 12 Jan 2021 | Published: 12 May 2020

IC Consult

Customer Identity and Access Management – The Master Key for Digital Markets
sponsored by IC Consult
WHITE PAPER: In today’s global market, everything centers on interfaces to customers: Who is the customer? How can their identity be confirmed reliably? Customer identity and access management (CIAM) is helping business answer these questions and more. In this white paper, examine the prerequisites, challenges and opportunities associated with CIAM.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

IC Consult

Keeping Remote Workers Safe and Your Work Secure
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

ID+: A Predictive Analytics Platform for Identity Verification
sponsored by Socure
DATA SHEET: In this data sheet, take a closer look at the top 4 challenges organizations are facing when it comes to identity verification, and discover how ID+, a predictive analytics platform for identity verification, is positioned to help organizations address these issues – read on to learn more about the platform.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Socure

Enterprise VPN Software Solutions
sponsored by NetMotion
RESOURCE: Modern approaches to remote access such as SDP are emerging, but most enterprises will continue to need a robust VPN that meets the needs of the increasingly mobile workforce. As such, NetMotion has designed a VPN with a focus in optimizing experience for mobile workers. Access this product page to learn more.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

NetMotion

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

MyID – Replacing Central Access Management with a State-of-the-Art IAM Solution
sponsored by IC Consult
CASE STUDY: Legacy authentication lacks flexibility, availability and security. Businesses are now searching for future-proof solutions that can optimize the flexibility of IT services by providing innovative and secure authentication methods. Peruse this case study to learn how iC Consult provided an enterprise-wide IAM solution through a hybrid cloud.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

IC Consult

Sigma Synthetic Fraud
sponsored by Socure
DATA SHEET: Synthetic identity fraud is continuing to emerge as the next generation of digital fraud and financial theft. The following data sheet provides a closer look at what this threat entails, why it’s been growing and how to best address it – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security
1 - 25 of 411 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info