Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Challenge Handshake Authentication Protocol

RSS Feed   
ALSO CALLED: Handshake Authentication Protocol, CHAP
DEFINITION: This stands for Challenge Handshake Authentication Protocol, a type of authentication in which the authentication agent (typically a network server) sends the client program a key to be used to encrypt the username and password. This enables the username and password to be transmitted in an encrypted form to protect them against eavesdroppers.
Challenge Handshake Authentication Protocol Reports
76 - 84 of 84 Matches Previous Page  |  Next Page
TOGAF® and SABSA® Integration
sponsored by ComputerWeekly.com
IT BRIEFING: This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
Posted: 05 Jan 2012 | Published: 11 Oct 2011

ComputerWeekly.com

Transitioning to LTE-M: Improving IoT Business Models
sponsored by Aeris
WHITE PAPER: In this white paper, look at 3 hurdles that can be overcome by implementing or transitioning to an LTE-M IoT solution including technology sunsets, module (radio) costs, and the extension of battery life.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

Aeris

Versa FlexVNF: Software-Defined Wide Area Network Test Report
sponsored by Versa Networks
ANALYST REPORT: According to NSS Labs, 3 of the most common reasons why enterprises deploy SD-WAN are to implement technologies that promise to improve manageability, cost, performance and security. In this report, find out how Versa Networks FlexVNF performed when tested by NSS on specific use cases.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Versa Networks

Video conferencing standards and interoperability considerations
sponsored by SearchSecurity.com
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

SearchSecurity.com

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com
76 - 84 of 84 Matches Previous Page    2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement