Standards  >   Network Protocols  >   Network Authentication Protocols  >  

Password Authentication Protocol

RSS Feed   
ALSO CALLED: PAP
DEFINITION: Short for Password Authentication Protocol, the most basic form of authentication, in which a user's name and password are transmitted over a network and compared to a table of name-password pairs. Typically, the passwords stored in the table are encrypted. The Basic Authentication feature built into the HTTP protocol uses PAP. See it used with reports on security. Contrast with CHAP.
Password Authentication Protocol Reports
1 - 25 of 31 Matches Previous Page  |  Next Page
Use Your Microsoft Certificate Authority for Passwordless Authentication
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

Passwordless Experience for A More Secure and Productive Workforce
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: Passwords are quickly becoming an outdated security tool, set to be replaced by passwordless authentication methods. In this solution brief, take a closer look at the key features and capabilities of Entrust Datacard’s passwordless authentication offering, designed to increase productivity, unify access and reduce password-related risks.
Posted: 08 May 2020 | Published: 08 May 2020

Entrust, Inc.

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales

Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI
sponsored by Thales
WHITE PAPER: In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.
Posted: 23 Apr 2020 | Published: 07 Apr 2020

Thales

It’s Time to Treat Your Organisation like your Smartphone
sponsored by SailPoint Technologies
WHITE PAPER: Traditional passwords are ill-equipped to be a standalone security measure. Today, most of our smartphones have evolved beyond passwords to include biometric authentication – so why haven’t organizations followed suit? Read on to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

SailPoint Technologies

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Hitachi ID Password Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

Hitachi ID Identity & Access Management Suite
sponsored by Hitachi ID
PRODUCT OVERVIEW: The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.
Posted: 03 May 2019 | Published: 03 May 2019

Hitachi ID

Why IT Shouldn't Be the Middle Guy in Password Resets
sponsored by OneLogin
PRODUCT OVERVIEW: When users forget their passwords, they need them reset. Guess who's on task? IT is right in the middle of the password reset equation. Download this resource to learn about Single Sign-On and how it can automate this task, so you don't have to be the password reset machine.
Posted: 02 May 2019 | Published: 02 May 2019

OneLogin

Solving the Password Problem in the Technology Industry
sponsored by OneLogin
WHITE PAPER: Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

OneLogin

Protecting against modern password cracking
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

ComputerWeekly.com

Take Control of Virtual Desktop Access with Two-Factor Authentication
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Citrix

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite

Manage with ease: Get peace of mind with HP and Windows Embedded
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this short white paper, you will gain insight into an innovative virtualization approach to alleviate the headaches of security processes and password logins.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

Hewlett Packard Enterprise

Hot Tips for Securing Your Wireless Network
sponsored by Sophos
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
sponsored by Intel
PRESENTATION TRANSCRIPT: User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk.  Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
Posted: 20 May 2011 | Published: 20 May 2011

Intel

Password Management Best Practices
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document describes and justifies password management best practices as applied in medium to large organizations. It offers reasoned guidance to IT decision makers when they set security policy and design network infrastructure that includes passwords.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

Hitachi ID Systems, Inc.

Password Management Project Roadmap
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: As today’s organizations deploy an ever-growing number of complex systems, password management problems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. This document will guide you through the entire life of a successful password management project.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

Hitachi ID Systems, Inc.
1 - 25 of 31 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info