IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
26 - 50 of 295 Matches Previous Page  |  Next Page
The Five Most Creative Ways that Organizations are Using Advanced Authentication
sponsored by Micro Focus
VIDEO: In this webinar, hear from identity and access management experts, Kent Purdy and Troy Drewry, about the new ways organizations are using the latest authentication technologies and how they're preparing the future.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Micro Focus

The Power of Trust between Businesses and Consumers
sponsored by Micro Focus
WHITE PAPER: From logging in to logging out and everything in between, modern authentication enables a positive customer interaction with your digital systems. In this white paper, learn how you can leverage today's technologies, such as multifactor authentication, to strike a balance between security, convenience, and long-term opportunities.
Posted: 04 Mar 2019 | Published: 31 Jul 2018

Micro Focus

Biometrics: Learn the advantages and disadvantages
sponsored by Onfido
EGUIDE: When used in conjunction with other authentication factors, like passwords or tokens, biometric authentication methods have the potential to improve security as well as the user experience. In this e-guide, learn about the advantages of biometrics.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Onfido

User Risk Report 2018
sponsored by Proofpoint
RESEARCH CONTENT: Users' personal cybersecurity habits are carrying over into work hours. And, often, infosecurity teams are overestimating end users' understanding of fundamental cybersecurity best practices. In this research report, explore key survey findings that address working adult's cybersecurity knowledge.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Proofpoint

A Guide To Fraud In The Real World
sponsored by Splunk Services UK Ltd
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk Services UK Ltd

5 Identity Pitfalls to Avoid
sponsored by Onfido
RESOURCE: Identity theft accounts for half of all reported fraud in the UK. And if you fail to catch that fraud, the cost to your business – both reputational and financial – can be catastrophic. Do you know the 5 most common identity pitfalls that businesses fall afoul of – and crucially, how to avoid them?
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

A Guide to Digital Identity Verification
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent. This white paper looks at 7 ways fraudsters are slipping through the net, what to watch out for and how to combat fraud in 3 simple steps.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

There Are Two Types Of Companies Today: Those that Have Had Security Breaches, And Those That Don't Know they Have.
sponsored by Lenovo and Intel
RESOURCE: The number of cyberattacks is rising every day and criminals are constantly developing more sophisticated and creative ways to expose vulnerabilities. Every device is at risk, and companies must rely on technology providers to "out-innovate" the bad guys. In this infographic and Q&A, explore Lenovo's end-to-end security offerings.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Lenovo and Intel

How Cybercriminals are Adapting to Outwit Defenses
sponsored by Dell SecureWorks
WEBCAST: From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.
Posted: 06 Feb 2019 | Premiered: Dec 5, 2018

Dell SecureWorks

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.
Posted: 04 Feb 2019 | Published: 31 Dec 2018

Dell SecureWorks

Data Protection and PCI Scope Reduction for Today's Businesses
sponsored by Micro Focus
WHITE PAPER: Tokenization is a method of data protection and audit scope reduction recommended by the PCI DSS Security Standards Council. However, merchants and service providers who have implemented it have encountered problems. In this white paper, learn about the SecureData platform with Secure Stateless Tokenization.
Posted: 30 Jan 2019 | Published: 30 Jun 2018

Micro Focus

How Tanium Addresses the NIST Cybersecurity Framework
sponsored by Tanium
RESOURCE: Download this checklist to see how Tanium can help organizations meet the guidelines within the NIST Cybersecurity Framework.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

Tanium

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Cybercriminals Are More Cunning Than Ever: Stay One Step Ahead
sponsored by Lenovo and Intel
RESOURCE: Cybercriminals are more cunning than ever, so it's increasingly important for you to find ways to help your organization stay one step ahead. Learn about ThinkShield by Lenovo and find out how you can keep your devices and data safe.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

Lenovo and Intel

Be Shielded From Every Angle in the Battle for Cybersecurity
sponsored by Lenovo and Intel
RESOURCE: Cybersecurity threats are all around you. It is important to shield against these threats from every angle. ThinkShield by Lenovo offers a comprehensive suite of end-to-end security offerings, with cutting-edge innovation that keep you safe.
Posted: 25 Jan 2019 | Published: 16 Oct 2018

Lenovo and Intel

The Role of Fault Tolerance for Blockchain
sponsored by HPE and Intel®
WHITE PAPER: How could blockchain improve your supply chain? How about for financial agreements and transactions? In this white paper, get more information about various aspects of blockchain, and explore how you can apply it to various sectors of your organization.
Posted: 23 Jan 2019 | Published: 31 Dec 2018

HPE and Intel®

Single sign-on: Understanding the role of SSO in security
sponsored by OneLogin
WHITE PAPER: IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a big problem when it comes to app security because they are difficult for IT to manage. Single sign-on, or SSO, gives users just one password they can use to access all their applications. In this white paper, learn about all things SSO.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Keep Calm and Authenticate: Why Adaptive is the Next Best Thing
sponsored by WSO2, Inc.
RESOURCE: Explore the evolution of authentication mechanisms, the advantages and disadvantages of each method, and how your organization could benefit from adaptive authentication.
Posted: 08 Nov 2018 | Published: 31 Oct 2018

WSO2, Inc.

Detecting Account Takeovers and Defending Your Users
sponsored by Signal Sciences
WHITE PAPER: In this white paper, learn about account takeover (ATO) attacks and how to defend your users against them.
Posted: 16 Oct 2018 | Published: 31 Dec 2017

Signal Sciences

Identity and Access Management in the Age of Intelligent Authentication
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 01 Sep 2018 | Published: 04 Dec 2018

TOPICS:  Authentication
TechTarget
26 - 50 of 295 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement