IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 454 Matches Previous Page  |  Next Page
Unlock a World of New Possibilities for your IoT Devices
sponsored by HYPR
RESOURCE: In this resource, learn about HYPR's decentralized authentication tool designed to help you transform your users' IoT devices into secure and convenient biometric keys that safety unlocks connected cars, locks, homes, ATMs and much more – with or without Internet connectivity.
Posted: 15 May 2018 | Published: 15 May 2018

HYPR

Considerations When Choosing the Best Strong Authentication Approach
sponsored by HID Global
WHITE PAPER: Discover the variables that should be considered when choosing the best authentication solution for your organization.
Posted: 14 May 2018 | Published: 14 May 2018

HID Global

Is Your Organization Prepared for GDPR?
sponsored by One Identity
RESOURCE: Review the 4 pillars of protection outlined by the EU GDPR, and a checklist that can help you understand where your organization stands with the regulation.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

SQL Server Security Practices
sponsored by Idera
WHITE PAPER: Explore some common security practices and how your organization can implement security measures within their deployment of SQL Server.
Posted: 11 May 2018 | Published: 11 May 2018

Idera

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: 81% of data breaches involve the misuse of privileged credentials, according to the Verizon DBIR. This white paper examines how privileged access management (PAM) can help reduce the risk associated with privileged accounts.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

The Breach Prevention Playbook: Simple Ways to Get IAM Right and Protect Your Organization
sponsored by One Identity
RESOURCE: Explore the IAM practices and technologies that provide the best path to cybersecurity that can bolster your chances of surviving and enable your organization to emerge with minimal damage.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

Password Security Guidelines
sponsored by TechTarget
RESOURCE: Users continue to remain vulnerable to hackers, whether being targeted with machine learning or traditional password guessing methods. To help keep your enterprise safe, we're offering access to our new member-exclusive guide, Password Security Guidelines.
Posted: 28 Apr 2018 | Published: 28 Apr 2018

TechTarget

Complete Guide to Preventing Account Takeover
sponsored by Sift Science
WHITE PAPER: Access this guide to preventing account takeover to learn how to tackle online business' latest foe: compromised accounts.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

Sift Science

Stop All Imposter Threats Coming Into and Going Out of your Organization
sponsored by Proofpoint, Inc.
VIDEO: Hear from John Pescatore from SANS and Ryan Terry from Proofpoint to learn about imposter threats coming into and going out of your organization. Uncover how to prevent phishing attacks and email spoofing
Posted: 25 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

5 Tips to Zero Trust Security Webinar
sponsored by Centrify Corporation
WEBCAST: The enterprise perimeter no longer exists with 90% of enterprises using the cloud. How does your enterprise ensure device, app and endpoint management? Take a look at this webinar to uncover a zero trust security strategy, which verifies every user, their device, and gives just enough access and privilege.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

Centrify Corporation

Zero Trust Identity and Access Management Webinar
sponsored by Centrify Corporation
WEBCAST: How does your enterprise plan to improve identity security? Tune into this on-demand webinar to uncover how a zero trust concepts can be applied to enhance IAM.
Posted: 18 Apr 2018 | Premiered: Apr 18, 2018

Centrify Corporation

Security's Password Crisis
sponsored by Centrify Corporation
WHITE PAPER: Are you neglecting secure access to apps and endpoints? This ebook offers an approach to lower your risk of getting breached by increasing your IAM maturity through adopting a Zero Trust approach with the right IDaaS strategy.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

Security's Privilege Crisis
sponsored by Centrify Corporation
WHITE PAPER: With compromised credentials as today's #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This ebook looks at what's behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

Identity Services Buyers' Guide
sponsored by Centrify Corporation
WHITE PAPER: How does your company plan to implement a mature approach to identity? This resource identifies the specific capabilities needed within 4 key areas of identity and compares capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

2018 Identity and Access Management Index Report
sponsored by Gemalto
RESEARCH CONTENT: According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a look at this report to learn about where organizations stand in terms of IAM and how they plan to augment security in the near future.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Gemalto

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Simplifying Fraud Analytics
sponsored by SAS
WHITE PAPER: According to SAS, as losses continue to grow, detecting and preventing fraud is consistently ranked among the top three investment and strategic priorities for insurance executives. Explore this resource to uncover 10 steps to detecting and preventing insurance fraud.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Protect the Integrity of the Procurement Function
sponsored by SAS
WHITE PAPER: The procurement process is extremely complex and as a result, fraud detection is challenging. Take a look at this resource to uncover trends and best practices in detecting and preventing global procurement fraud.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

SAS

Banking Across Generations Study
sponsored by Jumio
WHITE PAPER: According to Javelin Strategy and Research, 20% of individuals who have abandoned mobile banking blame it on the authentication process being time consuming. Take a look at this resource to gain insight into improving authentication and security within mobile banking, while ensuring a smooth customer experience.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Jumio

How to Fight Cybercrime: Tips from a Former FBI Agent
sponsored by Veeam Software
WHITE PAPER: What can the criminal activity of the 1930's teach us about cybercrime today? Read this white paper to find out, as Jeff Lanza, a former FBI agent with 20 years of experience shares tips on fighting ransomware in today's turbulent threat landscape.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Veeam Software

A Buyer's Guide to Online Identity Verification
sponsored by Jumio
WHITE PAPER: Because of cybercriminals and routine data breaches, trust is in increasingly short supply. This resource reveals how to evaluate vendors in the emerging trusted identity as a service space.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Jumio

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

HYPR

Stopping Email Fraud
sponsored by Proofpoint, Inc.
WHITE PAPER: Email fraud has cost victims more than $5.3 billion between the end of 2013 and 2017, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

Proofpoint, Inc.
1 - 25 of 454 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement