IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
26 - 50 of 313 Matches Previous Page  |  Next Page
Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

Why You Should Care About the NY DFS Cybersecurity Regulation
sponsored by Atakama
RESOURCE: Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 10 Dec 2020 | Published: 19 Oct 2020

Atakama

Customer attitudes to digital identity
sponsored by Onfido
WHITE PAPER: Digital identity is often discussed in the context of the benefits it provides the organization – but what about its impact on the customer? This report provides a closer look at the importance of digital identity for customer relationships, general perception and current solutions that may be worth your consideration – read on to get started.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

Cloud Enablement
sponsored by Atakama
CASE STUDY: Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Atakama

Complete Guide to Identity and Access Management
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 07 Dec 2020 | Published: 04 Dec 2018

TOPICS:  Authentication
TechTarget

IT Priorities 2020: After Covid-19, security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

ComputerWeekly.com

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Prevent Fraud And Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organisations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Privileged Access Management, Single Sign-On & Enterprise Password Managers
sponsored by Keeper Security Inc
EBOOK: When it comes to establishing effective identity and access management (IAM) practices, organizations can typically go 1 of 3 directions: Privileged access management (PAM), single sign-on (SSO) or enterprise password management. Read on for an analysis of each and discover how to choose the right IAM solution for your business.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Keeper Business Datasheet
sponsored by Keeper Security Inc
DATA SHEET: 81% of data breaches are due to weak, default or stolen passwords – a massive vulnerability that could be addressed with effective password management. In this data sheet, take a closer look at the key features and benefits of Keeper’s password management offering.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Zoom & Doom: How INKY Unraveled A Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Protecting Intellectual Property with Data Access Governance
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

SailPoint Technologies

SIG - Axcess Financial Customer Story
sponsored by Cisco Umbrella
CASE STUDY: In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

How to detect the 7 types of document and identity fraud
sponsored by Onfido
WHITE PAPER: Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Onfido

Multifactor authentication methods, use cases and products
sponsored by SearchSecurity.com
EBOOK: Multifactor authentication protects businesses from cyberattacks by requiring two or more forms of authentication from the user before allowing access. In this buyer's guide, explore multifactor authentication methods, use cases and market-leading products before making a final buying decision.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

SearchSecurity.com
26 - 50 of 313 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences