Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Challenge Handshake Authentication Protocol

RSS Feed   
ALSO CALLED: Handshake Authentication Protocol, CHAP
DEFINITION: This stands for Challenge Handshake Authentication Protocol, a type of authentication in which the authentication agent (typically a network server) sends the client program a key to be used to encrypt the username and password. This enables the username and password to be transmitted in an encrypted form to protect them against eavesdroppers.
Challenge Handshake Authentication Protocol Reports
1 - 25 of 83 Matches Previous Page  |  Next Page
A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

ComputerWeekly.com

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond
sponsored by Tanium
WHITE PAPER: To accommodate the transformation to remote work, organizations have upended their traditional IT infrastructure and adopted decentralized networks, cloud-based services, and widespread usage of employees’ personal devices. This has revealed critical gaps in visibility. Use this white paper to learn how to fill these gaps and remain resilient.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Tanium

Axis Security Video
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Barracuda CloudGen Access
sponsored by Barracuda
DATA SHEET: Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

Border Gateway Protocol: The Roadmap to the Internet
sponsored by AppNeta
WHITE PAPER: Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

CYBERSECURITY BUILT FOR YOUR BUSINESS, BUDGET AND STAFF
sponsored by Panda Security
EBOOK: In the US, 42% of employees are working from home full-time. As a result, managing distributed workforces has become a priority for organizational leaders. Remote deployment and lack of centralization have both created security and compliance risks. To regain control, view this e-book about the top organizational challenges and their solutions.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Panda Security

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE: Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

Enduring from home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

Automation in the Software-Defined Network
sponsored by VMware and Presidio
EGUIDE: In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.
Posted: 05 Apr 2017 | Published: 28 Mar 2017

VMware and Presidio

Automation in the Software-Defined Network
sponsored by VMware and Circle IT
EGUIDE: In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.
Posted: 03 May 2017 | Published: 28 Mar 2017

VMware and Circle IT

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Cisco Intercompany Media Engine for Dummies Section 1: SIP Alone Doesn't Cut It
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE: To help address the many questions about the Cisco Intercompany Media Engine, Wade Hamblin and Hakim Mehmood from the product team will post a "for Dummies" blog every 2 weeks to explain the basics and help you understand what it is, how it works, and why you should care.
Posted: 18 Mar 2010 | Published: 04 Dec 2009

Cisco Systems, Inc.

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Dual Stack Network
sponsored by Cisco Systems, Inc.
DATA SHEET: In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM
1 - 25 of 83 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences