Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Challenge Handshake Authentication Protocol

RSS Feed   
ALSO CALLED: Handshake Authentication Protocol, CHAP
DEFINITION: This stands for Challenge Handshake Authentication Protocol, a type of authentication in which the authentication agent (typically a network server) sends the client program a key to be used to encrypt the username and password. This enables the username and password to be transmitted in an encrypted form to protect them against eavesdroppers.
Challenge Handshake Authentication Protocol Reports
1 - 25 of 135 Matches Previous Page  |  Next Page
2020 Networking Trends: What Changes, and What Stays the Same?
sponsored by Zones, Inc.
WHITE PAPER: 2020 promises to be another year in which network development accelerates. But with so many options, routes to take, and decisions to make, how should you strategize your network development over the next year? In this e-guide, you'll find out which current trends will stick around, which new ones will emerge, and which fads promise to fade away.
Posted: 10 Jul 2020 | Published: 06 Jul 2020

Zones, Inc.

4 Actions IT Can Take to Ensure Business Continuity Using PKI Automation
sponsored by Sectigo
EBOOK: Managing risks has never been a greater challenge for IT professionals, and this is especially true when considering identity management. With an increasing number of angles for bad actors to steal passwords, it may be time for an evolution in authentication. Jump into this e-book to learn about public key infrastructure.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

4 Dimensions of Network Monitoring
sponsored by AppNeta
RESOURCE: Your network spans multiple cloud providers, third-party services, and an always-growing web of remote locations. Does your team have the comprehensive visibility to tie it all together? Download this quick checklist to ensure that you have all the data and insights you need to manage your network effectively.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

5 Ways to Keep Remote Workers Secure and Productive
sponsored by Absolute Software Corporation
WHITE PAPER: Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Absolute Software Corporation

6 Reasons to Expand Network Visibility
sponsored by AppNeta
RESOURCE: In a world where enterprise connectivity is more critical to business success than ever before, you need easy and efficient access to usage data. In this infographic, find out how you can expand upon the capabilities of NetFlow – a protocol developed for monitoring traffic – so that you can create even more comprehensive performance monitoring.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

AppNeta

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

ComputerWeekly.com

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

A Guide to Navigating Your Network Performance Successfully
sponsored by AppNeta
RESOURCE: Transforming your network is a lot like going on a hike. There are a number of steps that go into planning before you can get started. In this infographic, learn how to navigate your network performance successfully by getting the lay of the land, finding the best route and getting the right gear.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppNeta

A Step-by-Step Guide: Achieving Zero Standing Privilege
sponsored by Remediant
WHITE PAPER: Privileged access management has changed how organizations keep users in check, but as it turns out, it is not enough. 74% of breached organizations admitted that the breach was made through a privileged account. The issue is standing access. Learn about the benefits of zero standing privilege in this step-by-step guide.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond
sponsored by Tanium
WHITE PAPER: To accommodate the transformation to remote work, organizations have upended their traditional IT infrastructure and adopted decentralized networks, cloud-based services, and widespread usage of employees’ personal devices. This has revealed critical gaps in visibility. Use this white paper to learn how to fill these gaps and remain resilient.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Tanium

Aeris Whitepaper: How Wireless Connectivity Can Make or Break the Success of Your Remote Patient Monitoring Application
sponsored by Aeris
WHITE PAPER: Remote patient monitoring applications could dramatically reduce healthcare costs by enabling patients to receive effective and proper care from the comfort of their homes. In this brief, view best practices that can help remote patient monitoring companies decide which type of wireless connectivity to use and how to use it most effectively.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Aeris

An Introduction to Software-Defined Perimeters (SDP) and Zero Trust Network Access (ZTNA)
sponsored by NetMotion
WHITE PAPER: 87% of organizations were using a VPN in 2020 – 45% of organizations will still be using a VPN by the end of 2023. This is due to the growing popularity of software-defined perimeters (SDP), otherwise known as zero trust network access (ZTNA). In this white paper, discover how SDP/ZTNA works and why it’s the next step in remote access.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

NetMotion

Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Beyond Identity and Ping Identity Solution Brief
sponsored by Beyond Identity, Inc.
DATA SHEET: With the increase in both cloud application use and remote work, creating and scaling access management controls is growing more complex. Read up on a new partnership that is working to solve this problem by delivering passwordless authentication, improved end-user experience, risk-based authorization and reduced IT costs and overhead.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Beyond Identity, Inc.

Border Gateway Protocol: The Roadmap to the Internet
sponsored by AppNeta
WHITE PAPER: Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

Build a Solutions-Driven Culture with a Modern Identity
sponsored by Hitachi ID
DATA SHEET: Educational institutions must always invest where they’ll see the biggest impact. Digital identity, connecting students and staff to information that builds knowledge, is an opportunity for pivotal efficiency gains – but the hardest part of identity is management. View this data sheet to learn strategies for campus-wide identity management.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

Automation in the Software-Defined Network
sponsored by VMware and Circle IT
EGUIDE: In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.
Posted: 03 May 2017 | Published: 28 Mar 2017

VMware and Circle IT

Automation in the Software-Defined Network
sponsored by VMware and Presidio
EGUIDE: In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.
Posted: 05 Apr 2017 | Published: 28 Mar 2017

VMware and Presidio

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Cisco Intercompany Media Engine for Dummies Section 1: SIP Alone Doesn't Cut It
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE: To help address the many questions about the Cisco Intercompany Media Engine, Wade Hamblin and Hakim Mehmood from the product team will post a "for Dummies" blog every 2 weeks to explain the basics and help you understand what it is, how it works, and why you should care.
Posted: 18 Mar 2010 | Published: 04 Dec 2009

Cisco Systems, Inc.
1 - 25 of 135 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info