IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Passwords

RSS Feed   
DEFINITION: A strong password is one that is designed to be hard for a person or program to discover. Because the purpose of a password is to ensure that only authorized users can access resources, a password that is easy to guess is a security risk. Essential components of a strong password include sufficient length and a mix of character types. A typical weak password is short and consists solely of letters  … 

Passwords definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Passwords Reports
1 - 25 of 67 Matches Previous Page  |  Next Page
Lockdown Lessons: Shoring up Your Network and Security Policies
sponsored by Webroot
RESOURCE: Organizations have been required to create a sense of urgency around the review and possible rebuild of their network security. Indefinite remote work has placed architects in a fire storm, and without the proper defense and policy, your network could be in trouble. Read these 3 lockdown lessons to learn more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Webroot

Password Management
sponsored by SailPoint Technologies
VIDEO: Learn how SailPoint makes it easy for users to manage their passwords, while still complying with organizational security policies.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

SailPoint Technologies

Lessons in Threat Detection
sponsored by Orange Business Services
WHITE PAPER: The UK’s 2018 Cyber Security Breaches Survey found that 43% of businesses had experienced a cybersecurity breach in the last 12 months.With threats on the horizon, some businesses have decided that the best way to learn about their security is to hack… themselves?Jump into this white paper to see what one organization learned from doing so.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Thales

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales

Looking for a PeopleSoft ‘Quick Win’? Integrate SAML for Single Sign-On (SSO)
sponsored by Appsian
RESOURCE: Resetting passwords can quickly put a strain on IT help desk services. In fact, hackers know that passwords are being reset at a record pace, as demonstrated by the massive uptick in phishing attempts (+667% since Feb. according to Forbes.) Discover the 4 reasons why PeopleSoft customers should prioritize single sign-on today.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Appsian

Passwordless Authentication: How Giving Up Passwords Can Improve Security
sponsored by Thales
WHITE PAPER: Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI
sponsored by Thales
WHITE PAPER: In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.
Posted: 23 Apr 2020 | Published: 07 Apr 2020

Thales

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

MicroScope – September 2019: Helping digital transformation
sponsored by MicroScope
EZINE: The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future
Posted: 23 Aug 2019 | Published: 06 Sep 2019

MicroScope

Your Guide to Zero-Trust Security
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 04 Feb 2020

TechTarget

Hitachi ID Password Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

Hitachi ID Identity & Access Management Suite
sponsored by Hitachi ID
PRODUCT OVERVIEW: The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.
Posted: 03 May 2019 | Published: 03 May 2019

Hitachi ID

Mobile device security: Malware mitigation, recent attacks and more
sponsored by TechTarget
RESOURCE: Are you prepared? Improper access or limited visibility can lead to unintended data exposure or insider theft. Your free application security guide awaits. Guide includes: • Recent mobile attacks • Android vulnerabilities • Janus malware mitigation• And more
Posted: 03 Nov 2018 | Published: 03 Nov 2018

TOPICS:  Passwords
TechTarget

How to Keep your Enterprise Safe by Improving Password Policies
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 28 Apr 2018 | Published: 12 Jun 2019

TechTarget

Norton Cyber Security Insights Report – UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

Take Control of Virtual Desktop Access with Two-Factor Authentication
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Citrix

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID Global

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft
1 - 25 of 67 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info