IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Passwords

RSS Feed   
DEFINITION: A strong password is one that is designed to be hard for a person or program to discover. Because the purpose of a password is to ensure that only authorized users can access resources, a password that is easy to guess is a security risk. Essential components of a strong password include sufficient length and a mix of character types. A typical weak password is short and consists solely of letters  … 

Passwords definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Passwords Reports
1 - 25 of 77 Matches Previous Page  |  Next Page
Use Your Microsoft Certificate Authority for Passwordless Authentication
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

Passwordless Experience for A More Secure and Productive Workforce
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: Passwords are quickly becoming an outdated security tool, set to be replaced by passwordless authentication methods. In this solution brief, take a closer look at the key features and capabilities of Entrust Datacard’s passwordless authentication offering, designed to increase productivity, unify access and reduce password-related risks.
Posted: 08 May 2020 | Published: 08 May 2020

Entrust, Inc.

Duo Security's Two-Factor Authentication Evaluation Guide
sponsored by Duo Security
WHITE PAPER: As passwords grow increasingly ineffective, new ways of authenticating users and managing identities are needed to ensure the protection of sensitive data. In this evaluation guide, learn the criteria for customizing your evaluation process and discover how to assess the efficacy of a two-factor authentication tool.
Posted: 01 May 2020 | Published: 01 May 2020

Duo Security

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales

Looking for a PeopleSoft ‘Quick Win’? Integrate SAML for Single Sign-On (SSO)
sponsored by Appsian
RESOURCE: Resetting passwords can quickly put a strain on IT help desk services. In fact, hackers know that passwords are being reset at a record pace, as demonstrated by the massive uptick in phishing attempts (+667% since Feb. according to Forbes.) Discover the 4 reasons why PeopleSoft customers should prioritize single sign-on today.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Appsian

Passwordless Authentication: How Giving Up Passwords Can Improve Security
sponsored by Thales
WHITE PAPER: Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.
Posted: 27 Apr 2020 | Published: 31 Jan 2020

Thales

Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI
sponsored by Thales
WHITE PAPER: In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.
Posted: 23 Apr 2020 | Published: 07 Apr 2020

Thales

It’s Time to Treat Your Organisation like your Smartphone
sponsored by SailPoint Technologies
WHITE PAPER: Traditional passwords are ill-equipped to be a standalone security measure. Today, most of our smartphones have evolved beyond passwords to include biometric authentication – so why haven’t organizations followed suit? Read on to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

SailPoint Technologies

The Perimeter: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Identity and access management (IAM) is growing in popularity as a scalable and pragmatic security approach. This white paper highlights how IAM works, discusses the challenges to adopt this approach and provides IAM best practices to help you get started.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

F5 Networks

Ultimate Guide to Multi-factor Authentication
sponsored by Ping Identity Corporation
EGUIDE: When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

Multi-Factor Authentication for Customers
sponsored by Ping Identity Corporation
WHITE PAPER: Today’s customers are aware of the need for additional security measures and expect organizations to provide. To address the increasing ineffectiveness of passwords, security teams are beginning to embrace customer multi-factor authentication (MFA). Read this white paper to discover the benefits and how it differs from employee MFA.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Remote Vendor Access
sponsored by CyberArk Software, Inc
WHITE PAPER: Today’s organizations are heavily reliant on third-party vendors accessing their critical infrastructures. However, this presents an attractive target for hackers. In this white paper, discover how the CyberArk Alero architecture could help you achieve security without the need for VPNs or passwords. Read on to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc

CyberArk Alero Security
sponsored by CyberArk Software, Inc
DATA SHEET: Access management enables organizations to provide the same level of security to users, devices and apps whether they are remote or local. This data sheet takes a closer look at the CyberArk Alero architecture, which combines access management tools into one, unified platform. Read on to discover the features and capabilities of Alero.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

MicroScope – September 2019: Helping digital transformation
sponsored by MicroScope
EZINE: The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future
Posted: 23 Aug 2019 | Published: 06 Sep 2019

MicroScope

Winning the Battle Over Passwords
sponsored by OneLogin
WHITE PAPER: Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

OneLogin

Your Guide to Zero-Trust Security
sponsored by TechTarget
RESOURCE: Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 04 Feb 2020

TechTarget

Hitachi ID Password Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

Hitachi ID Identity & Access Management Suite
sponsored by Hitachi ID
PRODUCT OVERVIEW: The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.
Posted: 03 May 2019 | Published: 03 May 2019

Hitachi ID

5 Reasons Relying on Passwords is a Recipe For Disaster
sponsored by OneLogin
RESOURCE: In today's environment—with cybercrime rising and hackers beginning to use machine learning—passwords just don't provide enough protection for businesses. Download this resource for 5 reasons why.
Posted: 02 May 2019 | Published: 02 May 2019

OneLogin

Why IT Shouldn't Be the Middle Guy in Password Resets
sponsored by OneLogin
PRODUCT OVERVIEW: When users forget their passwords, they need them reset. Guess who's on task? IT is right in the middle of the password reset equation. Download this resource to learn about Single Sign-On and how it can automate this task, so you don't have to be the password reset machine.
Posted: 02 May 2019 | Published: 02 May 2019

OneLogin

Solving the Password Problem in the Technology Industry
sponsored by OneLogin
WHITE PAPER: Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

OneLogin

Mobile device security: Malware mitigation, recent attacks and more
sponsored by TechTarget
RESOURCE: Are you prepared? Improper access or limited visibility can lead to unintended data exposure or insider theft. Your free application security guide awaits. Guide includes: • Recent mobile attacks • Android vulnerabilities • Janus malware mitigation• And more
Posted: 03 Nov 2018 | Published: 03 Nov 2018

TOPICS:  Passwords
TechTarget

How to Keep your Enterprise Safe by Improving Password Policies
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 28 Apr 2018 | Published: 12 Jun 2019

TechTarget
1 - 25 of 77 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info