IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authentication

RSS Feed   
ALSO CALLED: Password Authentication, User Authentication, 3 Factor Authentication, Network Authentication, Carrier Access Codes, Remote Authentication, User ID, 2 Factor Authentication, Carrier Identification Codes, Access Authentication, Two-factor Authentication, Access Codes, 3-factor Authentication, 2-factor Authentication
DEFINITION: Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other. In a network environment, the client authenticates the server and vice-versa. In this way, network users can be assured that they are doing business exclusively with legitimate entities and servers can be certain that all would-be users are attempting  … 

Authentication definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary
Authentication Reports
76 - 100 of 409 Matches Previous Page  |  Next Page
Beyond Identity and Okta Solution Brief
sponsored by Beyond Identity, Inc.
PRODUCT OVERVIEW: Password-based authentication methods and a thing of the past. This solution brief explores the partnership between Beyond Identity and Okta, highlighting how they are working together to help organizations eliminate passwords, improve user experience, reduce IT costs, and more – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020

Cysiv

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: In the age of ransomware attack, your organization needs to proactively control identity and privileged access security, and it needs risk insight while maintaining scalability. View this Hitatchi ID Bravura Discover data sheet to learn about an approach to IAM and PAM that strives to identify hidden risks and scale with growing threats.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Passwordless Identity Management For Workforces
sponsored by Beyond Identity, Inc.
DATA SHEET: Learn about Beyond Identity for Workforces, a solution that provides secure, passwordless authentication for your workforce that integrates with your existing single sign-on (SSO) solution.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Beyond Identity, Inc.

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Privileged Access Management, Single Sign-On & Enterprise Password Managers
sponsored by Keeper Security Inc
EBOOK: When it comes to establishing effective identity and access management (IAM) practices, organizations can typically go 1 of 3 directions: Privileged access management (PAM), single sign-on (SSO) or enterprise password management. Read on for an analysis of each and discover how to choose the right IAM solution for your business.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Keeper Business Datasheet
sponsored by Keeper Security Inc
DATA SHEET: 81% of data breaches are due to weak, default or stolen passwords – a massive vulnerability that could be addressed with effective password management. In this data sheet, take a closer look at the key features and benefits of Keeper’s password management offering.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Would You Bet Your Business On the Strength of Every Employee’s Password?
sponsored by Panda Security
EBOOK: Password misuse and reuse present way too big a risk for password ‘use’ in general. Plus, passwords are not hard to obtain if you have the right hacking skill set – and they’re sought after, running for about $160 apiece on the dark web. If you’re searching for an alternative to passwords, check out this e-book on two-factor authentication.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

Managing Identity So You Can Scale
sponsored by Okta
WHITE PAPER: Today’s users expect an experience that is not only frictionless and personalized, but also secure. To meet this demand, organizations are turning to customer identity and access management (CIAM) tools. Read this white paper to learn more about Okta’s CIAM offering and how it’s benefitted some of their key partners.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Okta

Three Ways PKI Can Help Secure the Remote Workforce
sponsored by Sectigo
EBOOK: IT departments have found themselves under pressure to scale networks to support long-term remote work. With this scale comes a slew of network vulnerabilities that traditional identity management strategies may not be able to handle. View this in-depth e-book to learn 3 ways public key infrastructure can help protect remote workers.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

PKI Offers Better Identity Security Than Typical MFA Solutions
sponsored by Sectigo
RESOURCE: Identity is the new perimeter – how can you best protect the identities of your people, devices, and data? MFA can be effective, but it still leaves vulnerabilities that you must account for. View this infographic to learn why public key infrastructure may provide more robust security than typical MFA.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

4 Actions IT Can Take to Ensure Business Continuity Using PKI Automation
sponsored by Sectigo
EBOOK: Managing risks has never been a greater challenge for IT professionals, and this is especially true when considering identity management. With an increasing number of angles for bad actors to steal passwords, it may be time for an evolution in authentication. Jump into this e-book to learn about public key infrastructure.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

The Password-less Enterprise: Using PKI To Replace Passwords For Identity And Access
sponsored by Sectigo
WHITE PAPER: Today’s IT security teams need to be able to authenticate identities throughout the enterprise —whether those identities belong to humans, devices, data or applications. Unfortunately, passwords are either too vulnerable or just plain forgotten (or misused). Read this white paper to learn about public key infrastructure, a password-less approach.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

How Visibility Unlocks Zero-Disruption Microsegmentation
sponsored by ColorTokens
WEBCAST: Microsegmentation is gaining popularity amongst security architects for its ability to enhance agility, incident response, compliance readiness and more. Watch this webinar to learn more about the benefits and possibilities of microsegmentation from 2 distinguished experts.
Posted: 08 Oct 2020 | Premiered: Jul 29, 2020

ColorTokens

Path to PCI-DSS 4.0: Simplifying Compliance and Securing Cardholder Data
sponsored by ColorTokens
VIDEO: PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.
Posted: 07 Oct 2020 | Premiered: 12 Jun 2020

ColorTokens

Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

Microsegmentation: The First Step to Zero-Trust Security
sponsored by ColorTokens
RESOURCE: Modern security will see the elimination of adding network layer after network layer to fix security vulnerabilities. Businesses need a tighter security method, one that allows them to control traffic within and between segments. This is the basis of microsegmentation. Read this article to learn why microsegmentation is the way forward.
Posted: 06 Oct 2020 | Published: 23 Mar 2020

ColorTokens

Zero Trust eXtended Ecosystem Platform Providers
sponsored by Ionic Security
WHITE PAPER: This Forrester Wave Report evaluates the top vendors and offerings within the Zero Trust platform market – read on to unlock the vendor comparison matrix, scoring criteria and an in-depth analysis of each of the 15 most significant Zero Trust platform providers.
Posted: 06 Oct 2020 | Published: 24 Sep 2020

Ionic Security

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Definitive Guide to Zero-Trust Security
sponsored by ColorTokens
EBOOK: Upon first hearing the term zero-trust, it can feel a bit worrying to implement what sounds like a “never trust” security policy. But what it actually provides is “just enough trust” to authorized users while blocking out all other traffic. To learn more, dive into the Definitive Guide to Zero-Trust Security to understand how zero trust works.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

ColorTokens

Top Trends in Customer Identity and Access Management (CIAM) with analyst Mary Ruddy
sponsored by Okta
WEBCAST: Customer identity has gone mainstream. A seamless customer experience across devices is now expected. At the same time, security and privacy concerns are at an all-time high. View this webinar to hear from Gartner analyst Mary Ruddy and learn about findings from her recent research "Top 5 Trends in CIAM Solution Design".
Posted: 30 Sep 2020 | Premiered: Sep 30, 2020

Okta

How to Secure Your Remote Workforce Effectively
sponsored by BlackBerry
EBOOK: Remote working capabilities enable organizations to support a global workforce – and if done effectively it can yield benefits related to efficiency, flexibility and cost-effectiveness without sacrificing security. Read this eBook to learn how to secure remote workforces.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

BlackBerry

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta
76 - 100 of 409 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info