IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
76 - 100 of 514 Matches Previous Page  |  Next Page
Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE: Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

Considerations When Choosing the Best Strong Authentication Approach
sponsored by HID Global
WHITE PAPER: Discover the variables that should be considered when choosing the best authentication solution for your organization.
Posted: 14 May 2018 | Published: 14 May 2018

HID Global

What happens when IAM measures are attacked
sponsored by TechTarget
RESOURCE: Password policy problems? Your free guide to password security awaits. This guide includes:• Impacts of AI and machine learning • Employee security • NIST recommendations • And moreAdd your valuable security insights to our market research survey to access your password security guide and improve your organization's policies!
Posted: 28 Apr 2018 | Published: 03 Nov 2018

TechTarget

2018 Identity and Access Management Index Report
sponsored by Gemalto
RESEARCH CONTENT: According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a look at this report to learn about where organizations stand in terms of IAM and how they plan to augment security in the near future.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Gemalto

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Simplifying Fraud Analytics
sponsored by SAS
WHITE PAPER: According to SAS, as losses continue to grow, detecting and preventing fraud is consistently ranked among the top three investment and strategic priorities for insurance executives. Explore this resource to uncover 10 steps to detecting and preventing insurance fraud.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Protect the Integrity of the Procurement Function
sponsored by SAS
WHITE PAPER: The procurement process is extremely complex and as a result, fraud detection is challenging. Take a look at this resource to uncover trends and best practices in detecting and preventing global procurement fraud.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

SAS

Banking Across Generations Study
sponsored by Jumio
WHITE PAPER: According to Javelin Strategy and Research, 20% of individuals who have abandoned mobile banking blame it on the authentication process being time consuming. Take a look at this resource to gain insight into improving authentication and security within mobile banking, while ensuring a smooth customer experience.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Jumio

A Buyer's Guide to Online Identity Verification
sponsored by Jumio
WHITE PAPER: Because of cybercriminals and routine data breaches, trust is in increasingly short supply. This resource reveals how to evaluate vendors in the emerging trusted identity as a service space.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Jumio

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess

Securing content and access with smart management techniques
sponsored by SearchContentManagement
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

SearchContentManagement

Is Your Organization Prepared for GDPR?
sponsored by One Identity
RESOURCE: Review the 4 pillars of protection outlined by the EU GDPR, and a checklist that can help you understand where your organization stands with the regulation.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

SQL Server Security Practices
sponsored by Idera
WHITE PAPER: Explore some common security practices and how your organization can implement security measures within their deployment of SQL Server.
Posted: 11 May 2018 | Published: 11 May 2018

Idera

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: 81% of data breaches involve the misuse of privileged credentials, according to the Verizon DBIR. This white paper examines how privileged access management (PAM) can help reduce the risk associated with privileged accounts.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

The Breach Prevention Playbook: Simple Ways to Get IAM Right and Protect Your Organization
sponsored by One Identity
RESOURCE: Explore the IAM practices and technologies that provide the best path to cybersecurity that can bolster your chances of surviving and enable your organization to emerge with minimal damage.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

An Introduction to the FIDO Authentication Standard
sponsored by HYPR
EGUIDE: 63% of all successful data breaches can be tracked back to inadequate passwords, according to Verizon's DBIR. In this e-guide, security experts David Strom and Michael Cobb explore the Fast Identity Online (FIDO) Alliance and the impact it has on authentication and password protocols.
Posted: 21 Mar 2018 | Published: 19 Mar 2018

HYPR

Office 365 Security and Protection
sponsored by TrendMicro
WHITE PAPER: How is your enterprise securing Office 365? Explore this Osterman Research white paper to learn about data protection, archiving, security, encryption, and authentication best practices within Office 365.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

TrendMicro

Stopping Email Fraud
sponsored by Proofpoint, Inc.
WHITE PAPER: Email fraud has cost victims more than $5.3 billion between the end of 2013 and 2017, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

Proofpoint, Inc.

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Your Guide to MFA
sponsored by HYPR
EGUIDE: Many IT departments want to enforce multifactor authentication (MFA) on corporate content because the more layers of authentication a user has to go through means more data security. Explore this expert e-guide to gain insight into how companies are implementing MFA strategies and how biometrics plays a role in MFA security.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Externalized Dynamic Authorization in a MicroServices World
sponsored by Axiomatics
RESOURCE: This 3-part resource describes how your organization can apply Externalized Dynamic Authorization to an API and a microservices architecture that uses OAuth 2.0 flows or OpenID Connect (OIDC).
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Axiomatics

Identity Analytics – A more Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

Controlling and ManagingPrivileged Access
sponsored by One Identity
WHITE PAPER: Managing privileged accounts is becoming more critical as security and compliance initiatives grow. This white paper explores the risks associated with privileged accounts, and offers an easy-to-use risk mitigation strategy, which enables granular access control and accountability.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

One Identity
76 - 100 of 514 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement