IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
26 - 50 of 376 Matches Previous Page  |  Next Page
Protecting O365 and Microsoft Environments with Thales’ SafeNet Trusted Access
sponsored by Thales
WHITE PAPER: Organizations are shifting from traditional environments to cloud infrastructures, and security needs change along with migration. In this white paper, discover access challenges in cloud environments and explore how the capabilities of SafeNet Trusted Access, Thales’s cloud-based access management and authentication service, can help.
Posted: 28 Apr 2020 | Published: 31 Mar 2020

Thales

Zero-Trust in Practice
sponsored by Gigamon
WEBCAST: In reality, a Zero Trust architecture goes beyond “trust no one” and “build micro-perimeters around your data”, and requires organizations define their own framework, policies and practices. As a result, no two Zero Trust implementations are alike. Download this webcast to learn more.
Posted: 28 Apr 2020 | Premiered: Apr 28, 2020

Gigamon

The Latest Trends in Advanced Authentication Solutions
sponsored by HID Global
WHITE PAPER: It’s estimated that the cost of breaches, identity theft and other cybercrimes will reach $6 trillion by 2021, doubling their cost from 2015. In order to combat these threats, organizations are embracing identity and access management (IAM) to protect sensitive data. Read on to learn more about the latest IAM threats and trends.
Posted: 27 Apr 2020 | Published: 27 Jan 2020

HID Global

Digital Identity Proofing How to Verify Identities Remotely and Securely
sponsored by Entrust, Inc.
WHITE PAPER: In response to the recent surge of remote workers and online shoppers, organizations are having to take measures to ensure their environments are fit to secure the growing volume of users while maintaining experience. Read this white paper to learn more about an effective and scalable approach – identity proofing.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Entrust, Inc.

Application Access Redefined: Managing the Modern Workforce Application
sponsored by Akamai Technologies
WHITE PAPER: Many businesses across the globe are experiencing a sudden increase in remote users. But traditional VPN setups simply weren't scoped for so many off-site workers. Read this paper to understand the modern workforce's access requirements, the limits of traditional access technologies, and zero-trust access best practices.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Akamai Technologies

Passwordless Authentication: How Giving Up Passwords Can Improve Security
sponsored by Thales
WHITE PAPER: Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI
sponsored by Thales
WHITE PAPER: In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.
Posted: 23 Apr 2020 | Published: 07 Apr 2020

Thales

The Department of Transport Turns to Ivanti for ASD Top 4 Compliance
sponsored by Ivanti ANZ
CASE STUDY: Given the distributed nature of the Victoria, Australia’s Department of Transport, a holistic security program was needed in order to address challenges related to patching, unauthorized access and regulatory compliance. In this case study, discover how they partnered with Ivanti to address these security and compliance challenges.
Posted: 20 Apr 2020 | Published: 30 Nov 2019

Ivanti ANZ

Securely Maintain Business Continuity with A Remote Workforce
sponsored by Cybereason
WHITE PAPER: In response to social distancing recommendations, organizations have had to rapidly enable their entire staff to work remotely. However, such a dramatic shift can often lead to security oversights, which result in vulnerabilities. Read on to unlock a checklist and ensure your organization didn’t miss any vital preparation steps.
Posted: 20 Apr 2020 | Published: 17 Mar 2020

Cybereason

It’s Time to Treat Your Organisation like your Smartphone
sponsored by SailPoint Technologies
WHITE PAPER: Traditional passwords are ill-equipped to be a standalone security measure. Today, most of our smartphones have evolved beyond passwords to include biometric authentication – so why haven’t organizations followed suit? Read on to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

SailPoint Technologies

Creating an Identity-aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: As organizations continue to embrace transformative technologies, cyberattackers have discovered that the most successful and disruptive way to gain entry to your infrastructure is through your users. This white paper takes a closer look at the implications of insider threats and highlights how identity management may be able to help.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

SailPoint Technologies

5 Myths About Identity Governance
sponsored by SailPoint Technologies
WHITE PAPER: As IT environments grow more distributed and cyberattacks become more complex, organizations have begun to embrace identity governance to combat these threats. However, there are a lot of misconceptions surrounding this approach. This white paper clears the air by examining the top 5 identity governance myths.
Posted: 15 Apr 2020 | Published: 15 Apr 2020

SailPoint Technologies

Zero Trust’s Blind Spot: How Proactive Cyber Hygiene Preserves Zero Trust
sponsored by Automox
WHITE PAPER: Although zero-trust has grown in popularity, it should only serve as a piece of the cybersecurity puzzle rather than a standalone solution. In this white paper, discover why organizations should look to make widespread security improvements in order to fill in the gaps of zero-trust and get the most out of their security tools.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


Zero Trust Secure Access
sponsored by Pulse Secure
ANALYST REPORT: Our dynamic world of mobile and cloud computing requires advancing secure access capabilities based on continuous verification and authorization. In this Expert Focus e-zine, learn why and how to apply a zero-trust model for hybrid IT access and how software-defined perimeter adoption will expand in the years ahead.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Pulse Secure

Work from Home: An Application and Identity Management Guide
sponsored by EvolveIP
WHITE PAPER: Identity and access management (IAM) has enabled IT professionals to maintain security at scale, allowing organizations to continue their digital transformations. In this white paper, take a closer look into the methods and facets that make up IAM, as well as how to integrate remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Remote Work Considerations: Securing the New Corporate Network
sponsored by EvolveIP
WHITE PAPER: Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Enable and Secure Remote Work During the COVID-19 Pandemic
sponsored by Barracuda
PRODUCT OVERVIEW: The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Barracuda

Mitigating Security Risks for State and Local Government
sponsored by Cyber-Ark Software
WEBCAST: Privileged access management (PAM) is a scalable approach to security that focuses on users rather than relying on a perimeter. The nature of PAM is especially beneficial for addressing the challenges that state & local government agencies face today. Watch this webinar to learn more about PAM and view a demo of CyberArk’s PAM offering.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Cyber-Ark Software

Getting Customer IAM Right
sponsored by Ping Identity Corporation
WHITE PAPER: For organizations that interact directly with end-users, customer IAM (CIAM) has been a growing necessity for several years. Regardless of the name, CIAM is vastly different from employee IAM, both in terms of approach and end goals. This white paper highlights the differences between the two and offers tips for getting started with CIAM.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Ping Identity Corporation

The Perimeter: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Identity and access management (IAM) is growing in popularity as a scalable and pragmatic security approach. This white paper highlights how IAM works, discusses the challenges to adopt this approach and provides IAM best practices to help you get started.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

F5 Networks

How Privileged Access Management Protects State and Local Agencies
sponsored by Cyber-Ark Software
PRODUCT OVERVIEW: Ensuring the security of personally identifiable information (PII) is a key responsibility for state and local government agencies. In this solution brief, explore the features and capabilities of the Privileged Access Management platform and discover how agencies are leveraging it to enhance their security posture and protect access to PII.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cyber-Ark Software

Consumer Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Consumer authentication services enable online retailers and eCommerce organizations to shift away from passwords, which continue to pose a security risk. This report highlights some of the key players and offerings in the consumer authentication market, as well as a guide for choosing the right vendor. Read on to learn more.
Posted: 02 Apr 2020 | Published: 26 Sep 2019

Ping Identity Corporation

4 Actions to Secure Work from Home Employees
sponsored by Ping Identity Corporation
WEBCAST: Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Ping Identity Corporation

Workforce Authentication Authority
sponsored by Ping Identity Corporation
WHITE PAPER: Read this white paper to gain a deeper understanding of the benefits of a workforce authentication authority, its essential capabilities, and the use cases it can support.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Ping Identity Corporation

Ultimate Guide to Multi-factor Authentication
sponsored by Ping Identity Corporation
EGUIDE: When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation
26 - 50 of 376 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info