IT Management  >   Systems Operations  >   Security  >   AAA  >  


RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by, powered by an online computer dictionary
Authentication Reports
1 - 25 of 514 Matches Previous Page  |  Next Page
Multi-Factor Authentication (MFA): Is this the Security Solution You Need?
sponsored by OneLogin
WHITE PAPER: Users want a simple user experience to complement the way they work. IT wants an adequate level of risk mitigation for the organization. Implementation of adaptive Multi-Factor Authentication (MFA) can balance these two factors. Read on to learn more.
Posted: 16 Jan 2019 | Published: 16 Jan 2019


Single sign-on: Understanding the role of SSO in security
sponsored by OneLogin
WHITE PAPER: IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a huge problem when it comes to app security because they are difficult for IT departments to manage. Single sign-on or SSO gives users just one password they can use to access all their applications. In this white paper learn about all things SSO.
Posted: 16 Jan 2019 | Published: 16 Jan 2019


Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018

Akamai Technologies

MFA Everywhere: Requirements for Rapid Adoption
sponsored by Ping Identity Corporation
WEBCAST: 81% of confirmed data breaches involved weak, default or stolen passwords. This has led to an increase in multi-factor authentication adoption. This webcast reveals why MFA is just reaching wide spread adoption, why it is needed, requirements for implementing it and how to prepare organizations for a successful rollout.
Posted: 19 Dec 2018 | Premiered: Dec 19, 2018

Ping Identity Corporation

SSO+MFA Demo: Stop the #1 Security Attack Vector
sponsored by Ping Identity Corporation
WEBCAST: With credentials being the #1 attack vector, many organizations are replacing passwords with advanced authentication. This webcast discusses 5 key capabilities that can be used to secure the enterprise including multi-factor authentication, single sign-on and access security. During the webcast, you will also be walked through a demo SSO and MFA.
Posted: 19 Dec 2018 | Premiered: Feb 9, 2017

Ping Identity Corporation

The Cost of Credential Stuffing: Asia-Pacific
sponsored by Akamai Technologies
ANALYST REPORT: In this research report, discover the potential cost to prevent, detect and remediate credential stuffing attacks, as well as the financial consequences to companies if attackers are able to use stolen credentials to make fraudulent purchases or transactions.
Posted: 19 Dec 2018 | Published: 30 Jun 2018

Akamai Technologies

Goodbye 2FA. Hello Modern MFA
sponsored by Ping Identity Corporation
WEBCAST: According to Verizon's Data Breach Investigations Report, 81% of hacks involve weak or stolen credentials. Although typical multi-factor authentication is a step in the right direction, many have limited coverage, poor user experience and minimal policy options. In this webcast, learn how contextual MFA eliminates weak credentials.
Posted: 19 Dec 2018 | Premiered: Dec 12, 2017

Ping Identity Corporation

Multi-Factor Authentication: Best Practices for Securing the Modern Digital Enterprise
sponsored by Ping Identity Corporation
WHITE PAPER: Comprised credentials continue to be a top risk for breach with enterprises. One way to combat this issue is with step-up MFA. Step-up multi-factor authentication (MFA) is a dynamic authentication model where the user is required to perform additional authentication operations. This white paper proposes best practices for deployment of step-up MFA.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Ping Identity Corporation

Securing your Enterprise Credentials
sponsored by Ping Identity Corporation
WHITE PAPER: Stealing credentials is the primary motive for those that intend on attacking your enterprise. And relying on usernames and passwords can make it easier for them. In this white paper, learn how to implement an MFA solution to strengthen your security, so you can confidently manage digital transformation across your enterprise.
Posted: 18 Dec 2018 | Published: 30 Jun 2017

Ping Identity Corporation

You Can't Spell Enterprise Security without MFA
sponsored by Ping Identity Corporation
WEBCAST: Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and controls with multi-factor authentication, allowing them to move away from a high-risk, password based security approach. Listen as Paul Madsen from the CTO office of Ping Identity explains the benefits of MFA.
Posted: 18 Dec 2018 | Premiered: Dec 31, 2018

Ping Identity Corporation

Credential Stuffing Attacks: 2018 Security Report
sponsored by Akamai Technologies
RESEARCH CONTENT: In this quarterly report, discover how credential stuffing and advanced DDoS attacks have affected organizations this year.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Akamai Technologies

The Security Leader's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 10 Dec 2018 | Published: 31 May 2017

Ping Identity Corporation

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

Modern Two-Factor Authentication: Easy. Affordable. Secure
sponsored by Duo Security
WHITE PAPER: The ease of stealing IDs and passwords has led to criminals targeting organizations of all sizes. However, two-factor authentication stops easy access to stolen credentials by requiring a second level of authentication. Find out why deploying two-factor authentications may be a better choice for your company.
Posted: 07 Dec 2018 | Published: 31 Dec 2013

Duo Security

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018


Keep Calm and Authenticate: Why Adaptive is the Next Best Thing
sponsored by WSO2, Inc.
RESOURCE: Explore the evolution of authentication mechanisms, the advantages and disadvantages of each method, and how your organization could benefit from adaptive authentication.
Posted: 08 Nov 2018 | Published: 31 Oct 2018

WSO2, Inc.

Detecting Account Takeovers and Defending Your Users
sponsored by Signal Sciences
WHITE PAPER: In this white paper, learn about account takeover (ATO) attacks and how to defend your users against them.
Posted: 16 Oct 2018 | Published: 31 Dec 2017

Signal Sciences

SmartKey Security Overview
sponsored by Equinix
RESOURCE: Learn how your enterprise can protect its most sensitive data in any cloud environment.
Posted: 21 Nov 2018 | Published: 21 Nov 2018


Single Sign-On for Cloud and On Premise Apps
sponsored by Radware
VIDEO: In this webinar, explore Single Sign-On (SSO), see how your enterprise may benefit from implementing this technology, and how Multi-factor authentication (MFA) fits in.
Posted: 07 Nov 2018 | Premiered: 12 Apr 2018


Blockchain Applications for Identity Verification
sponsored by Evident
WHITE PAPER: Blockchain applications are constantly evolving and show promise for the identity world. Read on to explore 3 specific identity verification applications of digital ledger technology and where they align in the security world.
Posted: 02 Nov 2018 | Published: 02 Nov 2018


Identity Proofing and GDPR: What Businesses Need to Know
sponsored by Evident
WHITE PAPER: The GDPR has catalyzed immense change and it is poised to cause even more disruption in the years to come. Inside, explore 8 central data subject rights established by GDPR, and uncover the user verification problems associated with the rights.
Posted: 01 Nov 2018 | Published: 01 Nov 2018


What Hackers Know That You Don't
sponsored by Evident
WHITE PAPER: Companies such as LinkedIn, Uber and Equifax have all been victims of significant data hacks. In this white paper, uncover some basics of how breaches happen and where data travels when they do, as well as how you can strengthen security protocols to prevent breaches in the future.
Posted: 01 Nov 2018 | Published: 01 Nov 2018


Protect Against Compromised Accounts
sponsored by Proofpoint, Inc.
VIDEO: According to recent data from the FBI, in the last 5 years, there have been more than 78K business email account compromise scam incidents worldwide. Download this webcast to learn about why account compromises are on the rise, how they are affecting businesses, and how cybercriminals perform the attack, and more.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

B├╝roalltag im Wandel: das Leben am digitalen Arbeitsplatz
sponsored by Citrix
WHITE PAPER: Hier erfahren Sie, wie ein sicherer, integrierter digitaler Arbeitsplatz Ihnen dabei hilft, einen besseren Kundendienst bereitzustellen, Leiharbeiter und mobile Mitarbeiter sicher einzugliedern und den Wettbewerbsvorteil auszubauen.
Posted: 22 Oct 2018 | Published: 09 Nov 2018


Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
RESOURCE: Discover the importance of identity governance and how you can effectively manage it while taking account of complexity, compliance and limited IT resources.
Posted: 01 Oct 2018 | Published: 31 Dec 2017

One Identity
1 - 25 of 514 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement