IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
126 - 150 of 373 Matches Previous Page  |  Next Page
5 Steps to Minimize Your Exposure to Ransomware Attacks Webinar
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Anatomy of a Hack Webinar
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Zero Trust Privilege for Dummies
sponsored by Centrify Corporation
EBOOK: To better protect against data breaches, the use of a Zero-Trust model has returned to the spotlight and seen huge growth in adoption. Instead of using the traditional approach of "trust, but verify," the Zero-Trust model implements "never trust, always verify" as its guiding principle. Download Zero Trust Privilege For Dummies to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

The 2019 Zero Trust Privilege Maturity Model Report
sponsored by Centrify Corporation
ANALYST REPORT: To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

Privileged Access Management Buyers' Guide
sponsored by Centrify Corporation
WHITE PAPER: This buyers' guide is designed to help you choose the right privileged access management solution for your organization. Read on for the 9 major areas needed for your company to achieve strong privileged access management, and compare the features and capabilities to look for when selecting a solution.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Centrify Corporation

Norfolk County Council Bolsters Productivity with IdentityIQ
sponsored by SailPoint Technologies
CASE STUDY: Norfolk County Council (NCC) needed to prioritize an identity-centric security program that alleviated the growing concern over disparate systems and manual processes. In this case study, learn how NCC leveraged SailPoint to manage the identities working within their organization for all types of employment.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

SailPoint Technologies

Implementing a Zero-Trust Approach to Network Security
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 04 Feb 2020

TechTarget

Uniquely You: Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

Fighting Fraud —the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Read on to learn how your organization can implement identity best practices without adding friction to any digital onboarding experience.
Posted: 23 May 2019 | Published: 23 May 2019

Onfido

Ansarada Sees Significant Resource Savings With Auth0
sponsored by Auth0
RESOURCE: Since authentication and user management is critical to Ansarada's platform and critical to their security posture, they looked to Auth0 to help them get ahead of their challenges with creating a central identity service. Download this case study to learn more.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Auth0

ACT.md Sees 2x Dev Savings With Auth0
sponsored by Auth0
RESOURCE: To serve patients well, providers need fast and secure access for a wide variety of health and government institutions, each with different ways of verifying identity. In this case study, learn how ACT.md was able do so using Auth0.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Auth0

Evaluating Identity Verification Solutions
sponsored by Onfido
RESOURCE: When evaluating an Identify and Access Management system, there are many criteria to look out for. Download this interactive checklist to help you.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Onfido

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 28 Apr 2018 | Published: 12 Jun 2019

TechTarget

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 03 Jun 2019 | Published: 30 May 2019

Onfido

The End of the Password?
sponsored by Onfido
EBOOK: Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.
Posted: 30 May 2019 | Published: 30 May 2019

Onfido

The End of the Password?
sponsored by Onfido
EGUIDE: Biometric authentication systems have gained traction on mobile devices, but when will they become dominant within the enterprise? Download this e-guide for insights from biometrics expert, Bianca Lopes. She explains why she thinks several steps need to be taken before biometric authentication systems can replace passwords in most enterprises.
Posted: 30 May 2019 | Published: 29 May 2019

Onfido

The Future of Identity and Access Management Tools
sponsored by Jumio
EGUIDE: Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess

Securing content and access with smart management techniques
sponsored by SearchContentManagement
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

SearchContentManagement

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

HYPR

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR
126 - 150 of 373 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences