IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
26 - 50 of 348 Matches Previous Page  |  Next Page
Automating Identity & Access Management
sponsored by Hitachi ID
WEBCAST: Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.
Posted: 14 Nov 2019 | Premiered: Feb 28, 2019

Hitachi ID

3 Key Capabilities for Next-Generation Identity and Access Management
sponsored by IBM
WEBCAST: Traditionally, identity and access management (IAM) was designed by engineers, for engineers to be customizable and siloed. Next-generation IAM’s goal is to enhance security by improving on these methods. Explore the IAM “as a service” delivery model and uncover it’s 3 key capabilities. Continue to this webinar to learn more.
Posted: 13 Nov 2019 | Premiered: Nov 13, 2019

IBM

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Now Tech: Authentication Management Solutions, Q3 2018
sponsored by IBM
WHITE PAPER: Organizations use authentication management to simplify processes, reduce operational costs and enhance customer experience by minimizing friction. But selecting a vendor can be overwhelming.In this Forrester report, explore the features of 26 diverse providers in order to help you find a vendor that meets your organizational needs.
Posted: 12 Nov 2019 | Published: 07 Aug 2018

IBM

The Challenges of Trusted Access in a Cloud-First World
sponsored by Thales
WHITE PAPER: With over 1,050 participants, the 2019 Thales Access Management Index revealed common security trends, concerns and access management technologies around cloud adoption used by today’s organizations. Download the executive summary to uncover the key findings and takeaways towards secure access management.
Posted: 12 Nov 2019 | Published: 31 Jul 2019

Thales

RPA Security Best Practices
sponsored by CyberArk Software, Inc
WEBCAST: Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

CyberArk Software, Inc

Securing Robotic Procession Automation (RPA) with CyberArk
sponsored by CyberArk Software, Inc
WHITE PAPER: Robotic process automation (RPA) enables businesses to execute their digital transformation initiatives by providing a framework to carry out processes faster, longer, more efficiently & with a higher level of quality. In this cheat sheet, discover the benefits of RPA & a service designed to add a layer of security to your RPA strategy.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

CyberArk Software, Inc

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: This infographic highlights some of the key takeaways from the 2019 Thales Access Management Index. Continue reading to uncover the key takeaways as they relate to top access management tools, the role of data breaches in access management adoption & other significant statistics.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

Integrating Password and Privilege Management for Unix and Linux Systems
sponsored by BeyondTrust Corporation
WHITE PAPER: With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.
Posted: 06 Nov 2019 | Published: 31 Jan 2019

BeyondTrust Corporation

Buyer’s Guide for Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

Five Steps To A Zero Trust Security Strategy Q&A
sponsored by Ionic Security
WHITE PAPER: Following a recent webcast on the zero-trust approach, Stephanie Balaouras, Vice President, Research Director for Security & Risk at Forrester Research participated in a Q&A with audience members. Review some of Balaouras’ insights on data-centric security strategy approaches.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ionic Security

Protecting Privileged Access Is Critical to the Protection of a Company’s Crown Jewels
sponsored by CyberArk Software, Inc
WHITE PAPER: In this infographic from Privileged Access Security for Dummies, discover some tips & best practices when it comes to protecting your company’s data. Learn how to: Secure critical information, reduce cyberattack risk, and take preventative security action.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

CyberArk Software, Inc

Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

Mobile Fraud Detection: Top 4 Threats to the Mobile Channel
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

Retailers are Creating More Opportunity for Fraudsters
sponsored by LexisNexis® Risk Solutions
RESOURCE: Fraudster are exploiting digital channels and seizing more opportunities across a diverse set of retailers. Learn more about fraud attempts, targets, driving factors, top challenges and recommendations in this infographic.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In
sponsored by LexisNexis® Risk Solutions
RESOURCE: The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

CyberArk Privilege Cloud Whiteboard Video
sponsored by CyberArk Software, Inc
VIDEO: CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.
Posted: 24 Oct 2019 | Premiered: 24 Oct 2019

CyberArk Software, Inc

Pogo Paradox: Is Your Infrastructure Your Worst Enemy?
sponsored by PortSys
RESOURCE: In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.
Posted: 14 Oct 2019 | Published: 15 Sep 2019

PortSys

It May Be Time To Rethink RDP
sponsored by PortSys
RESOURCE: RDP, Microsoft’s widely used remote access tool, continues to be a prime target of malicious cyber criminals. The problem is only getting worse as hackers broaden their reach through highly advanced automated attacks. In this article, learn why a zero trust solution can help strengthen and simplify your overall access infrastructure.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

Can Zero Trust Fix What’s Wrong with IT Security?
sponsored by PortSys
RESOURCE: Why is zero trust such a prominent discussion both in the board room and among IT security professionals? Read this article for a look at how zero trust access changes the IT security game today.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

Take a Better TAC to Protect RDP
sponsored by PortSys
RESOURCE: Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Making the Business Case for Zero Trust Access
sponsored by PortSys
RESOURCE: Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.
Posted: 27 Sep 2019 | Published: 07 Jun 2019

PortSys

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys
26 - 50 of 348 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement