IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Passwords

RSS Feed   
DEFINITION: A strong password is one that is designed to be hard for a person or program to discover. Because the purpose of a password is to ensure that only authorized users can access resources, a password that is easy to guess is a security risk. Essential components of a strong password include sufficient length and a mix of character types. A typical weak password is short and consists solely of letters  … 

Passwords definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Passwords Reports
1 - 25 of 65 Matches Previous Page  |  Next Page
MicroScope – September 2019: Helping digital transformation
sponsored by MicroScope
EZINE: The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future
Posted: 23 Aug 2019 | Published: 06 Sep 2019

MicroScope

Winning the Battle Over Passwords
sponsored by OneLogin
WHITE PAPER: Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

OneLogin

Key Steps to Put Your Zero-Trust Security Plan Into Action
sponsored by TechTarget
RESOURCE: The traditional network perimeter is disappearing, that's why many turn to zero trust. Participate in our multiple-choice survey for a free PDF of our guide Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 06 Sep 2019

TechTarget

Hitachi ID Password Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: Download this product overview to learn how Password Manager can help lower IT support cost and improve the security of login processes at your organization today.
Posted: 07 May 2019 | Published: 07 May 2019

Hitachi ID

Hitachi ID Identity & Access Management Suite
sponsored by Hitachi ID
PRODUCT OVERVIEW: The Hitachi ID Identity and Access Management Suite streamlines and secures the management of identities, groups, entitlements and credentials across systems and applications, on-premises and in the cloud. Download this product brief, to learn more about the Hitachi ID Suite and its three products.
Posted: 03 May 2019 | Published: 03 May 2019

Hitachi ID

5 Reasons Relying on Passwords is a Recipe For Disaster
sponsored by OneLogin
RESOURCE: In today's environment—with cybercrime rising and hackers beginning to use machine learning—passwords just don't provide enough protection for businesses. Download this resource for 5 reasons why.
Posted: 02 May 2019 | Published: 02 May 2019

OneLogin

Why IT Shouldn't Be the Middle Guy in Password Resets
sponsored by OneLogin
PRODUCT OVERVIEW: When users forget their passwords, they need them reset. Guess who's on task? IT is right in the middle of the password reset equation. Download this resource to learn about Single Sign-On and how it can automate this task, so you don't have to be the password reset machine.
Posted: 02 May 2019 | Published: 02 May 2019

OneLogin

Authentication Devices
sponsored by HID Global
PRODUCT OVERVIEW: Today it's critical to move beyond passwords to more secure authentication methods to ensure the person asking for access is who they say they are. In this product selection guide, take a look at different types of authentication tokens to see which one is right for your organization.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

HID Global

Avoid Authentication Anarchy: How to Choose your Authenticator
sponsored by HID Global
RESOURCE: Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

HID Global

Solving the Password Problem in the Technology Industry
sponsored by OneLogin
WHITE PAPER: Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

OneLogin

Mobile device security: Malware mitigation, recent attacks and more
sponsored by TechTarget
RESOURCE: Are you prepared? Improper access or limited visibility can lead to unintended data exposure or insider theft. Your free application security guide awaits. Guide includes: • Recent mobile attacks • Android vulnerabilities • Janus malware mitigation• And more
Posted: 03 Nov 2018 | Published: 03 Nov 2018

TOPICS:  Passwords
TechTarget

How to Keep your Enterprise Safe by Improving Password Policies
sponsored by TechTarget
RESOURCE: In this expert guide to Password Security Guidelines, learn how you can keep your enterprise safe by improving your password policies today. We ask you to participate in our Security Market Research Program to receive a free download of the guide.
Posted: 28 Apr 2018 | Published: 12 Jun 2019

TechTarget

Norton Cyber Security Insights Report – UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

Take Control of Virtual Desktop Access with Two-Factor Authentication
sponsored by Citrix
EGUIDE: In this expert e-guide, we explore the concept of two-factor authentication (2FA) and how it applies to virtual desktop access. Find out how this approach improves password management without adding complexity to the user experience.
Posted: 13 Dec 2016 | Published: 12 Dec 2016

Citrix

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Do You Have the Right Authentication Tools to Keep the Bad Guys Out?
sponsored by RSA Softcat
EGUIDE: Multifactor authentication (MFA) can be a critical component of an enterprise security strategy, but choosing the right product or service is a challenge. Access this e-guide to learn about 8 of the top MFA products in the market, and determine which is best for your enterprise.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID Global

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata
1 - 25 of 65 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement