IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Passwords

RSS Feed   
DEFINITION: A strong password is one that is designed to be hard for a person or program to discover. Because the purpose of a password is to ensure that only authorized users can access resources, a password that is easy to guess is a security risk. Essential components of a strong password include sufficient length and a mix of character types. A typical weak password is short and consists solely of letters  … 

Passwords definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Passwords Reports
1 - 25 of 70 Matches Previous Page  |  Next Page
Okta + HYPR: Secure, Passwordless Authentication for Employees and Consumers
sponsored by Okta
DATA SHEET: Passwords present a significant weakness in an organization’s security architecture, and cybercriminals are keen on exploiting this weakness. Read this data sheet to learn how Okta and HYPR are enabling organizations to eliminate passwords in favor of passwordless authentication methods.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Garancy IAM Suite: Identity & Access Management Solution for Dynamic Companies
sponsored by Beta Systems
DATA SHEET: According to Carnegie Mellon, insider attacks are causing almost 200% more damage on average per case than attacks coming from outside. So it must be asked – is your identity and access management (IAM) up to snuff? If you feel as though your IAM suite could use a lookover or even a re-tool, read this data sheet and see what you may be missing.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Financial Services
sponsored by Hitachi ID
PRODUCT OVERVIEW: Given increasingly stringent compliance mandates within the financial industry, it’s no surprise that managing risk and maintaining compliance are top of mind – especially when it comes to authentication or IAM programs. Read this solution brief to see how Hitachi ID is helping financial organizations meet their privacy and compliance needs.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Hitachi ID

Beyond Identity and Okta Solution Brief
sponsored by Beyond Identity, Inc.
PRODUCT OVERVIEW: Password-based authentication methods and a thing of the past. This solution brief explores the partnership between Beyond Identity and Okta, highlighting how they are working together to help organizations eliminate passwords, improve user experience, reduce IT costs, and more – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Privileged Access in Healthcare
sponsored by Hitachi ID
DATA SHEET: The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Passwordless Identity Management For Workforces
sponsored by Beyond Identity, Inc.
DATA SHEET: Learn about Beyond Identity for Workforces, a solution that provides secure, passwordless authentication for your workforce that integrates with your existing single sign-on (SSO) solution.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Beyond Identity, Inc.

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

Privileged Access Management, Single Sign-On & Enterprise Password Managers
sponsored by Keeper Security Inc
EBOOK: When it comes to establishing effective identity and access management (IAM) practices, organizations can typically go 1 of 3 directions: Privileged access management (PAM), single sign-on (SSO) or enterprise password management. Read on for an analysis of each and discover how to choose the right IAM solution for your business.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Keeper Business Datasheet
sponsored by Keeper Security Inc
DATA SHEET: 81% of data breaches are due to weak, default or stolen passwords – a massive vulnerability that could be addressed with effective password management. In this data sheet, take a closer look at the key features and benefits of Keeper’s password management offering.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Keeper Security Inc

Would You Bet Your Business On the Strength of Every Employee’s Password?
sponsored by Panda Security
EBOOK: Password misuse and reuse present way too big a risk for password ‘use’ in general. Plus, passwords are not hard to obtain if you have the right hacking skill set – and they’re sought after, running for about $160 apiece on the dark web. If you’re searching for an alternative to passwords, check out this e-book on two-factor authentication.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Panda Security

Credential Harvesting: Virtually Hijacking Your Employee’s Credentials
sponsored by Inky Technology
RESOURCE: Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Inky Technology

Password Management
sponsored by SailPoint Technologies
VIDEO: Learn how SailPoint makes it easy for users to manage their passwords, while still complying with organizational security policies.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

SailPoint Technologies

Looking for a PeopleSoft ‘Quick Win’? Integrate SAML for Single Sign-On (SSO)
sponsored by Appsian
RESOURCE: Resetting passwords can quickly put a strain on IT help desk services. In fact, hackers know that passwords are being reset at a record pace, as demonstrated by the massive uptick in phishing attempts (+667% since Feb. according to Forbes.) Discover the 4 reasons why PeopleSoft customers should prioritize single sign-on today.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Appsian

Passwordless Datasheet
sponsored by Okta
DATA SHEET: Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

MicroScope – September 2019: Helping digital transformation
sponsored by MicroScope
EZINE: The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future
Posted: 23 Aug 2019 | Published: 06 Sep 2019

MicroScope

Implementing a Zero-Trust Approach to Network Security
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 04 Feb 2020

TechTarget

Password Security Guidelines
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 28 Apr 2018 | Published: 12 Jun 2019

TechTarget

Norton Cyber Security Insights Report – UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

Take Control of Virtual Desktop Access with Two-Factor Authentication
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Citrix

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
1 - 25 of 70 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences