IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
51 - 75 of 297 Matches Previous Page  |  Next Page
Keep Calm and Authenticate: Why Adaptive is the Next Best Thing
sponsored by WSO2, Inc.
RESOURCE: Explore the evolution of authentication mechanisms, the advantages and disadvantages of each method, and how your organization could benefit from adaptive authentication.
Posted: 08 Nov 2018 | Published: 31 Oct 2018

WSO2, Inc.

Detecting Account Takeovers and Defending Your Users
sponsored by Signal Sciences
WHITE PAPER: In this white paper, learn about account takeover (ATO) attacks and how to defend your users against them.
Posted: 16 Oct 2018 | Published: 31 Dec 2017

Signal Sciences

Identity and Access Management in the Age of Intelligent Authentication
sponsored by TechTarget
RESOURCE: In the world of authentication techniques, security experts have bemoaned the weaknesses of the password and username form of authentication security. But biometrics, voice, facial and behavioral recognition are taking hold in security.
Posted: 01 Sep 2018 | Published: 04 Dec 2018

TOPICS:  Authentication
TechTarget

PIM, PAM and PUM: 2018 Fundamentals and Best Practices for Linux/Unix Privileged Identity and Access Management
sponsored by HelpSystems
WHITE PAPER: This white paper touches on the importance of PIM, PUM and PAM understanding and planning. Find out how you can transform your multi-vendor Linux and Unix server environment into one centrally managed security domain to simplify security policies and control access rights.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

The Essentials: Privileged Access Management
sponsored by HelpSystems
WHITE PAPER: Find out how you can effectively control and protect privileged UNIX and Linux accounts using centralized access management.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

Akamai Technologies

Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE: Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

Why it's Critical to Improve your Password Policies in the age of GDPR
sponsored by TechTarget
RESOURCE: Now that we are living in the era of GDPR, it's critical more than ever to have a strong password policy in place to minimize the chances of a data breach announcement. In our expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today.
Posted: 28 Apr 2018 | Published: 09 Feb 2019

TechTarget

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: One of the most important aspects of an IAM program is the securing, management and governance of privileged accounts. This resource uncovers strategies for successfully managing privileged accounts in order to improve your IAM approach.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

One Identity

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Enterprise single sign-on in the Cloud and Mobile Era
sponsored by TechTarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 26 Sep 2017 | Published: 03 Nov 2018

TechTarget

The Future of Identity and Access Management Tools
sponsored by Jumio
EGUIDE: Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess

Securing content and access with smart management techniques
sponsored by SearchContentManagement
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

SearchContentManagement

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

HYPR

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Getting Started with Cloud IAM Services
sponsored by OneLogin
EGUIDE: In this e-guide learn how to get started with IAM services in the cloud, as well as what you need to know about cloud IAM before implementation.
Posted: 24 Jul 2017 | Published: 19 Jul 2017

OneLogin

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017


How IAM has Evolved on the Cloud: The Good and the Bad
sponsored by IBM
EGUIDE: Learn how IAM has evolved on the cloud, what has worked well and what IAM procedures need to be strengthened to meet future threats in various virtual environments.
Posted: 15 Feb 2017 | Published: 14 Feb 2017

IBM
51 - 75 of 297 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement