IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 399 Matches Previous Page  |  Next Page
Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

Turning Over a New Leaf in Your Identity and Access Management Strategy
sponsored by Ivanti
WHITE PAPER: The transition from traditional role-centric identity and access management (IAM) to an effective technology-enabled, policy-driven strategy is a challenge. But a policy-driven path that looks more holistically at identity will be more dynamic and deliver more power and flexibility to IT. Take a look at this white paper to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Ivanti

Zero Trust Network Access
sponsored by VMware, Inc.
EBOOK: VMware Secure Access provides enterprises a way for their employees to leverage a secure and fast connection to cloud-based applications and corporate technical resources. Read the e-book to get the full details.
Posted: 20 Nov 2020 | Published: 31 May 2019

VMware, Inc.

EUC Security for Work-from-Home
sponsored by TierPoint
WHITE PAPER: End user computing (EUC) allows users to access data from a centralized, enterprise-class data center where it is professionally managed, monitored and backed up. But centralizing data alone won’t protect your organization from a growing plethora of cyberthreats. So, how can you better protect your end users? Read this white paper to find out.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

TierPoint

Leveraging Ivanti to Accelerate Time to Value at a Lower Cost
sponsored by Ivanti
CASE STUDY: When considering an operational upgrade, banks must take deliberate precautions to ensure they’re adhering to regulatory requirements. This case study overviews Woodforest National Bank’s journey towards an improved IAM program, highlighting their key challenges and how they partnered with Ivanti to overcome them.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Ivanti

Success from the Start: Top Tips For Beginning An ID Badge Or Card Program
sponsored by HID Global
EBOOK: For organizations embarking on an ID badge/card program there are a number of key implementation steps and often overlooked – but vital – considerations to make to ensure success from the start. This eBook provides insight into these planning considerations, and more – read on to unlock your copy.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

IT Priorities 2020: After Covid-19, security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

ComputerWeekly.com

Remote Work Demands a Zero-Trust Approach for Both Apps and Users
sponsored by Citrix
RESOURCE: Workers are now accessing data outside of the office, which means that VPNs and basic anti-malware/antivirus software are no longer providing ample security for apps and data. Read this custom article to understand the benefits of zero-trust network architecture, which includes an embedded two-minute video on why the time for zero-trust is now.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Citrix

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

Multifactor authentication methods, use cases and products
sponsored by SearchSecurity.com
EBOOK: Multifactor authentication protects businesses from cyberattacks by requiring two or more forms of authentication from the user before allowing access. In this buyer's guide, explore multifactor authentication methods, use cases and market-leading products before making a final buying decision.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

SearchSecurity.com

Building a Basis of Trust and Transparency
sponsored by Onegini
CASE STUDY: When the Netherlands’ oldest independent wealth manager took steps towards the future, they did so with great consideration for their clients’ best interests. They explored ways to serve their clients with mobile apps, which factored in IAM. View this case study to see how Van Lanschot was able to secure a robust mobile IAM platform.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Onegini

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 13 Nov 2020 | Published: 25 Aug 2020

HID Global

Key IAM Automation Policies and Controls for Stronger Governance
sponsored by Hitachi Vantara
RESOURCE: Colleges and universities need a flexible IAM solution that can keep users secure and systems compliant. Still, many schools stick with manual homegrown, legacy systems believing they’re the only way to ensure both flexibility and security. But there’s a simpler way. Read this short article to learn 3 key policies for IAM automation.
Posted: 12 Nov 2020 | Published: 15 Sep 2020

Hitachi Vantara

How Higher Education Can Combat Hackers with IAM Automation
sponsored by Hitachi Vantara
RESOURCE: Threat actors target colleges and universities because of their vast wealth of personal information, extensive pools of research and ever-growing collections of data, and the number of attacks on these institutions is increasing – in large part due to automation. How can these attacks be defended? View this article to learn the answer.
Posted: 12 Nov 2020 | Published: 15 Oct 2020

Hitachi Vantara

The Role of Biometrics in Multi-Factor Security
sponsored by BIO-key International
EGUIDE: Biometrics offers organizations an additional method of authentication – therefor adding to their security. However, there are limitations to consider. Read this e-guide for a closer look at these concern areas and how to address them.
Posted: 12 Nov 2020 | Published: 28 Oct 2020

BIO-key International

Two-Factor Authentication is Broken: What Comes Next?
sponsored by BIO-key International
EGUIDE: The philosophy behind two-factor or multi-factor authentication (2FA/MFA) has been to authenticate a device rather than an identity. For many reasons, this loose ‘identity approximation’ method will not hold up in the long run. To learn more, study our expert guide Two-Factor Authentication is Broken: What Comes Next?
Posted: 12 Nov 2020 | Published: 29 Oct 2020

BIO-key International

Identity Cloud for Regulated Industries
sponsored by Onegini
WHITE PAPER: As companies in regulated industries move their businesses online, they must secure all digital identity as well as identify and authenticate users. Read this brochure to learn how Onegini Identity Cloud can help to simplify the registration, identification, authentication and lifecycle management of your customers, agents and brokers.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Onegini

CIAM as a Fundament to Enable Digital Initiatives Within Baloise
sponsored by Onegini
CASE STUDY: An acclaimed Swiss financial services company was aiming to implement a B2C identity and access solution for customers in Belgium, a traditionally broker-oriented market. They needed to focus on both the prevention of identity theft attacks and tougher regulations for consumer protection. View this case study to learn the result of their efforts.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Onegini

IAM Automation: The Secret to Governance and Cybersecurity Success in Higher Ed
sponsored by Hitachi Vantara
RESOURCE: Remote and hybrid learning models require increased remote access – underlining the importance of effective IAM security and governance. But how can schools keep up with the growing number of remote devices? Automation. Read this article to learn how to incorporate IAM automation into higher ed institutions.
Posted: 11 Nov 2020 | Published: 08 Sep 2020

Hitachi Vantara

IAM Automation Controls Prevent the Risks in Higher Education
sponsored by Hitachi Vantara
RESOURCE: Higher education institutions face a unique set of identity and access management (IAM) challenges – namely finding and mitigating risks related to orphan and dormant accounts. Read this article to learn about how IAM automation controls can address these risks.
Posted: 11 Nov 2020 | Published: 30 Sep 2020

Hitachi Vantara

How to Easily and Securely Implement MFA for Web and Web App to Protect Social Data
sponsored by Onegini
WHITE PAPER: As online services expand and high-security transactions increase, organizations are urged to strengthen their existing online portals and apps with an MFA solution to safeguard particularly sensitive transactions. But implementing this technology can be a difficult task. Read this white paper to learn how to easily and securely implement MFA.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

Onegini

Thales’ SafeNet Trusted Access Brings Security To Access And Authentication
sponsored by Thales
PRODUCT REVIEW: Selecting an identity and access management (IAM) tool that balances functionality with security can be difficult. This product review, written by third-party cybersecurity expert David Strom, provides a comprehensive overview and assessment of Thales’ SafeNet Trusted Access tool – read on to see what Strom has to say.
Posted: 06 Nov 2020 | Published: 31 Jan 2020

Thales

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems
1 - 25 of 399 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info