Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Challenge Handshake Authentication Protocol

RSS Feed   
ALSO CALLED: Handshake Authentication Protocol, CHAP
DEFINITION: This stands for Challenge Handshake Authentication Protocol, a type of authentication in which the authentication agent (typically a network server) sends the client program a key to be used to encrypt the username and password. This enables the username and password to be transmitted in an encrypted form to protect them against eavesdroppers.
Challenge Handshake Authentication Protocol Reports
51 - 75 of 176 Matches Previous Page  |  Next Page
Effectively Addressing Advanced Threats Survey
sponsored by IBM
ANALYST REPORT: Keeping up with these threats can be daunting—until we consider what it takes to defend against them. Not all threats are created equal—however, not all defenses are created equal either. This survey from SANS Institute, in partnership with IBM, uncovers how large, mature organizations deal with advanced threats.
Posted: 07 Aug 2020 | Published: 31 Jul 2019

IBM

Enduring from Home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Essential Enterprise Mobile Security Controls
sponsored by SearchSecurity.com
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

SearchSecurity.com

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

Gigamon Insight Solution: Detect, Investigate & Remediate Network Issues
sponsored by Gigamon
RESOURCE: In this brief white paper, learn about Gigamon's Insight Solution and how it can provide the needed visibility to detect, investigate, and remediate network issues.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

How IT Decision-Makers are Responding to COVID-19
sponsored by Aruba Networks
WHITE PAPER: As the world moves toward a hybrid workplace (employees in between office and remote), IT investments and therefore IT consumption are set to change drastically on a global scale across all industries. Want to see the numbers? View this in-depth report.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Aruba Networks

How IT Security is Adapting to the Changing Environment in 2020
sponsored by Cisco Umbrella
WEBCAST: With COVID-19 upon the world, IT security professionals are asking: What are the main challenges organizations are facing? What are some of the trends in the security market today? How can businesses adapt to stay secure now that employees and customers are working from home? Watch this webcast for a look at answers to these questions.
Posted: 18 Aug 2020 | Premiered: Apr 21, 2020

Cisco Umbrella

How SSL-Encrypted Web Connections are Intercepted
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

SearchSecurity.com

How to enhance your network for the future
sponsored by ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 21 Apr 2016 | Published: 15 Aug 2016

ComputerWeekly.com

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference

How to Make SASE Real for Your Organization
sponsored by Forcepoint
EBOOK: SASE may be in its pioneering stages, but it’s shaped to revolutionize the way corporate networks are securely accessed. With network and security moving through the cloud through SASE, traffic is kept away from your network, keeping it safe from intruders. Dive into this e-book for a glimpse at SASE technology and what it could provide.
Posted: 14 Jul 2020 | Published: 12 Jun 2020

Forcepoint

How to Re-establish Your Network and Security Perimeter
sponsored by Insight
WEBCAST: Data protection is being prioritized now more than ever. Organizations are looking for ways to improve their posture and maintain their business integrity by managing investments based on the correct risk profile. But when it comes to security, correctness takes time. Watch this webcast for a pragmatic approach to privacy and security.
Posted: 28 Jul 2020 | Premiered: Jul 28, 2020

Insight

How to Successfully Secure Ecommerce
sponsored by Rackspace
WEBCAST: With more and more business transacted online, and with cyberthreats growing more and more complex, businesses need to find ways to optimize the performance of their websites without compromising security or falling short of compliance. Watch this webinar presented by Rackspace and Akamai for a guide through this challenge.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Rackspace

How to Take Advantage of 5G Wireless Technology
sponsored by CradlePoint
EGUIDE: As the reality of 5G wireless communications builds, enterprises are looking toward new ways of doing business with higher speed and increased capacity. New 5G wireless technology promises super-fast network speeds and massive capacity. In this e-guide, learn how organizations can begin to prepare for 5G in the enterprise.
Posted: 04 May 2020 | Published: 04 May 2020

CradlePoint

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

Extreme Networks Solution with NEC
sponsored by Extreme Networks
WHITE PAPER: Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.
Posted: 29 Aug 2013 | Published: 30 Apr 2013

Extreme Networks

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

How to Save Time and Money Making Your Transition to IPv6
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Cisco Systems, Inc.

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.
51 - 75 of 176 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info