Authentication White Papers

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 101 - 125 of 263Sort Results By: Published Date | Title | Company Name
By: NetIQ     Published Date: Dec 08, 2011

"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:

Tags : security, breach, management, security management, event, infrastructure, threat, threat detection
    
By: Webroot     Published Date: Dec 06, 2011

In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security

Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
    
By: HP - Enterprise     Published Date: Nov 22, 2011

Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.

Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
    
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: LogRhythm     Published Date: Nov 16, 2011

This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.

Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
By: Brainloop     Published Date: Nov 09, 2011

This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.

Tags : brainloop, security, compliance risks, sharing information, security management, data protection, access control, authentication
    
By: Brainloop     Published Date: Nov 09, 2011

This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.

Tags : brainloop, enterprise, information management, security options, technology, business, access control, authentication
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, access control
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Thawte     Published Date: Oct 31, 2011

Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.

Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!

Tags : webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.

Tags : application security, authentication, email security, high availability, identity management, internet security, intrusion detection, intrusion prevention
    
By: Secunia     Published Date: Oct 12, 2011

This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: CA Technologies     Published Date: Sep 29, 2011

The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.

Tags : technology, virtual, identity management, access control, security, protection, application security, authentication
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to learn five key ways MFT makes a difference for your business.

Tags : seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to discover more about the true cost of "free" file sharing systems and file sharing best practices.

Tags : seeburger, file sharing, erp systems, file storage, security, file transwer, tco, mft
    
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011

Read the white paper to find out how Managed File Transfer ensures your data flow is secure and speedy.

Tags : seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
    
By: Absolute Software     Published Date: Sep 09, 2011

Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.

Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.