IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
26 - 50 of 402 Matches Previous Page  |  Next Page
A Fast Path Guide to Success
sponsored by Appsian
RESOURCE: For financial risk management and security leaders, protecting legacy ERP data in the age of remote work is shaping up to be a significant challenge in the new year. Read this blog post to learn more about the Appsian Security Platform and how its features are designed to identify remote security risks and protect ERP data.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

BlackBerry Cyber: Video
sponsored by BlackBerry
VIDEO: According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

BlackBerry

BlackBerry Cyber Suite
sponsored by BlackBerry
PRODUCT OVERVIEW: In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

BlackBerry

Arrow & RSA Video 1: Password-less Authentication
sponsored by Arrow & RSA
PODCAST: Passwords have been trusted by organizations for decades, and they’ve worked well, but as time goes on, bad actors are getting smarter and smarter, and passwords are getting weaker and weaker. So, what does the future of authentication hold if not passwords? Listen to this RSA-sponsored discussion about password-less authentication to find out.
Posted: 23 Dec 2020 | Premiered: Dec 23, 2020

Arrow & RSA

Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access
sponsored by Arrow & RSA
WEBCAST: Digital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.
Posted: 23 Dec 2020 | Premiered: Aug 12, 2020

Arrow & RSA

A New Paradigm for Identity Assurance
sponsored by Arrow & RSA
WHITE PAPER: Today’s cyberthreats target either the users with access to critical data, or the data itself – and traditional security approaches are no longer viable against these attacks. The following whitepaper explores how identity assurance is changing, the role of authentication, and how to better protect your users and data – read on to get started.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Arrow & RSA

Barracuda CloudGen Access
sponsored by Barracuda
DATA SHEET: Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

Simplify Card Printing with the Affordable & Efficient HID Fargo INK1000
sponsored by HID Global
EBOOK: This e-book provides a closer look at HID’s FARGO INK100, an affordable, low-maintenance and efficient ID printer designed to provide high quality printing for ID badges, student or faculty IDs, gift and loyalty cards – read on to learn more about the printing technology.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

HID Global

Has ID Card Issuance Been Marooned on a Desert Island?
sponsored by HID Global
WHITE PAPER: As organizations today put more considerations into how they secure access to critical data, the case for incorporating security cards becomes stronger. Read this brief to discover 10 reasons why ID card issuance is worth revisiting and explore the benefits organizations could realize from its use.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

HID Global

5 Steps to Secure Home Devices & Improve Productivity for Remote Work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Why Zero Trust, Why Now
sponsored by Microsoft
RESOURCE: Zero trust isn’t a new concept, but its rise in popularity is relatively recent. But why did it take so long to catch on? And what is it about today’s unique challenges that make zero trust especially pertinent? Read this article to find out.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

Microsoft

Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE: The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020

Atakama

Zero-Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Digital transformation has emerged as a key driver to cloud migration – in fact, 83% of workloads are expected to be cloud-based by the end of the year. Securing your data as you migrate it to the cloud is essential. Read this article to learn more about common cloud migration challenges and how to protect your data in transition.
Posted: 10 Dec 2020 | Published: 28 Oct 2020

Atakama

Security: Creating Trust in a Zero-Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

Customer Attitudes to Digital Identity
sponsored by Onfido
WHITE PAPER: Digital identity is often discussed in the context of the benefits it provides the organization – but what about its impact on the customer? This report provides a closer look at the importance of digital identity for customer relationships, general perception and current solutions that may be worth your consideration – read on to get started.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

Cloud Enablement
sponsored by Atakama
CASE STUDY: Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Atakama

How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

Identity and Access Management in the Age of Intelligent Authentication
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 07 Dec 2020 | Published: 04 Dec 2018

TOPICS:  Authentication
TechTarget

Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

Zero Trust Network Access
sponsored by VMware, Inc.
EBOOK: VMware Secure Access provides enterprises a way for their employees to leverage a secure and fast connection to cloud-based applications and corporate technical resources. Read the e-book to get the full details.
Posted: 20 Nov 2020 | Published: 31 May 2019

VMware, Inc.

Success from the Start: Top Tips For Beginning An ID Badge Or Card Program
sponsored by HID Global
EBOOK: For organizations embarking on an ID badge/card program there are a number of key implementation steps and often overlooked – but vital – considerations to make to ensure success from the start. This eBook provides insight into these planning considerations, and more – read on to unlock your copy.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

IT Priorities 2020: After Covid-19, security goes back to basics
sponsored by ComputerWeekly.com
EGUIDE: This year's transition to remote working highlighted big gaps in the fundamentals of security, as updated TechTarget/Computer Weekly data reveals.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

ComputerWeekly.com

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global
26 - 50 of 402 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info