IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
1 - 25 of 508 Matches Previous Page  |  Next Page
Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Simple and Smart Security for the Enterprise Cloud
sponsored by MobileIron
RESOURCE: Download this resource to learn about a new security framework that allows your organization to confidently adopt mobile-cloud technologies while reducing the risk of data breaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

MobileIron

Kubernetes Open-Source Orchestration & Security
sponsored by Aqua Security
RESOURCE: For those who use the open-source capabilities of Kubernetes security, there are 4 types of threats that you should know about. In this resource, explore a discussion of threat models, various security considerations and best practices for optimizing your Kubernetes deployment.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

Two-Factor Authentication That Makes Users and IT Security Happy
sponsored by One Identity
WHITE PAPER: Download this white paper to learn about One Identity, an identity and access management tool that uses a set of factors to assess the risk a given access attempt represents, and respond with appropriate security measures.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

A Guide to Endpoint Privilege Management Security Fundamentals
sponsored by Avecto Ltd
WHITE PAPER: Learn what endpoint privilege management is and how it helps defend against malware threats. Plus, get tips on how to deploy endpoint privilege management technology that fits into your existing security systems.
Posted: 09 Aug 2018 | Published: 08 Aug 2018


Microsoft Vulnerabilities Report Security Fundamentals
sponsored by Avecto Ltd
RESEARCH CONTENT: In this Microsoft security report, learn about the incredibly important role played by making sure Windows admin rights are properly allocated – and what vulnerabilities can be opened up when they're not.
Posted: 09 Aug 2018 | Published: 31 Dec 2017


Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 02 Aug 2018 | Published: 31 Oct 2016

IBM

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control.
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Protect your Organization: Know your Users and Data
sponsored by IBM
WHITE PAPER: Your organization will face many threats – but does it have the tools to deal them? Download this resource to protect yourself and your organization from insider threats and attacks and save your business from suffering the damage.
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 31 Jul 2018 | Published: 31 Jul 2016

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESEARCH CONTENT: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 30 Jul 2018 | Published: 31 Jul 2016

IBM

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 30 Jul 2018 | Published: 21 Feb 2018

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

The Forrester Wave: Risk-Based Authentication
sponsored by IBM
RESEARCH CONTENT: Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.
Posted: 26 Jul 2018 | Published: 17 Jul 2017

IBM

The Forrester Wave: Risk-Based Authentication
sponsored by IBM
RESEARCH CONTENT: Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.
Posted: 26 Jul 2018 | Published: 17 Jul 2017

IBM

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM

Identity-Driven Security
sponsored by Okta
WHITE PAPER: Find out how to bolster your security posture by upping your defenses against threats – both internal and external – with identity-driven security that strives to improve identity and access management as well as authentication.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Okta

Strong Authentication Across the Enterprise
sponsored by Okta
VIDEO: As organizations and workplaces evolve, less control is exercised over devices, services, and networks, leading to a gap with traditional security tools. Tune into this webinar for a look at how your organization can gain strong authentication across the enterprise.
Posted: 27 Aug 2018 | Premiered: 27 Aug 2018

Okta
1 - 25 of 508 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement