> Technology > Security > Authentication

Authentication

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 1 - 25 of 291Sort Results By: Published Date | Title | Company Name
White Paper Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
application security, authentication, email security, high availability, identity management
    
Secunia
White Paper Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management
    
IDology
White Paper Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines
    
Identity Engines
White Paper Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature
    
ARX (Algorithmic Research)
Webinar Published By: ESET     Published Date: Sep 07, 2011
Protection for small and medium businesses against viruses and cybercrimes.
Tags : 
eset, black hat conference, hacking the car, malware, protection
    
ESET
White Paper Published By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : 
dlp, data loss, security, best practices, access control
    
CDW
White Paper Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication
    
Entrust Datacard
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This guide provides information on how to reduce risk in today's IT environment.
Tags : 
reduce risk in it environment, it environment security, data security breach prevention, preventive measures for data security, application security
    
Kaspersky
White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches
    
VeriSign Authentication Services, now a part of Symantec Corp.
White Paper Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
Tags : 
verisign, privacy, security requirements, electronic health records, ehrs
    
VeriSign, Inc.
White Paper Published By: Acronis EMEA     Published Date: May 18, 2015
Download this datasheet to discover the main benefits of Acronis Access Advanced.
Tags : 
acronis, acronis access advanced, secure mobile access, security, content security
    
Acronis EMEA
White Paper Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit
    
McAfee
White Paper Published By: Adobe     Published Date: May 12, 2016
This paper reveals the benefits of using e-signatures.
Tags : 
esignature, digital signature, online signature, electronic signature, benefits of using esignatures
    
Adobe
White Paper Published By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection
    
McAfee
White Paper Published By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : 
data breaches, data center, security, cyber threats, server
    
Bit9
White Paper Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
Webinar Published By: NetIQ     Published Date: Dec 08, 2011
Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.
Tags : 
automating, webcast, security, vulnerabilities, resources
    
NetIQ
White Paper Published By: Kaseya     Published Date: Apr 04, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
it security, anti-virus, vulnerability management, intrusion prevention, access control
    
Kaseya
White Paper Published By: EMC Corporation     Published Date: Mar 08, 2012
This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.
Tags : 
leveraging, emc, deduplication, solutions, backup
    
EMC Corporation
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.
Tags : 
ibm, it security, password security, malware prevention, security infrastructure
    
IBM
White Paper Published By: Avaya     Published Date: Jun 15, 2016
Solving critical healthcare IT challenges with software-defined networkingDigitization is changing healthcare forever as organizations look to deliver better quality services, improve patient safety and provide the highest levels of security. Healthcare IT leaders should look to leverage a software-defined network. Read the latest from ZK Research to learn more.
Tags : 
healthcare, information technology, networking, security, access control
    
Avaya
White Paper Published By: Symantec     Published Date: Oct 02, 2012
Making the Best Choice When Considering Your Online Security Options
Tags : 
access control, anti spyware, anti virus, authentication, business continuity
    
Symantec
White Paper Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls
    
VeriSign, Inc.
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.