Authentication White Papers

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 101 - 125 of 236Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Sep 09, 2011

Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.

Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
By: ESET     Published Date: Sep 07, 2011

This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.

Tags : eset, security solutions for business, malware, antivirus, protection, cybercrime, anti virus, authentication
    
By: ESET     Published Date: Sep 07, 2011

Protection for small and medium businesses against viruses and cybercrimes.

Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus
    
By: ESET     Published Date: Sep 07, 2011

Learn valuable tips and techniques to fully protect your smartphone against security threats.

Tags : eset, gemini trojan, android phone, apps, security, threats, smartphone, applications
    
By: ESET     Published Date: Sep 07, 2011

Selecting an antivirus for your small or medium business that won't slow you down.

Tags : eset, antivirus, security, smb, protection, cybercrime, precautions, safety
    
By: ESET     Published Date: Sep 07, 2011

Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.

Tags : eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
    
By: Absolute Software     Published Date: Sep 06, 2011

See how Absolute Manage Mobile Device Management allows organizations to remotely manage their AppleŽ iOS devices (iPhoneŽ, iPodŽ Touch, iPadT).

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Absolute Software     Published Date: Sep 06, 2011

View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.

Tags : absolute, computrace, secure, tracking, security, manage, protect, application security
    
By: HP - Enterprise     Published Date: Aug 31, 2011

New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.

Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
    
By: NetIQ     Published Date: Aug 05, 2011

In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.

Tags : novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management
    
By: Thawte     Published Date: Aug 03, 2011

A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.

Tags : ssl, online data transfer, security, authentication, security management
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.

Tags : verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.

Tags : verisign, cloud hosting provider, ssl certificates, secure sockets layer, cloud computing, data recovery, business continuity, data access
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.

Tags : verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.

Tags : verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.

Tags : verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

Tags : verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.

Tags : verisign, security solution, ssl, trust, malicious activity, online businesses, sensitive information, e-commerce security
    
By: Symantec.cloud     Published Date: Aug 03, 2011

This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.

Tags : symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security
    
By: Entrust     Published Date: Aug 03, 2011

Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.

Tags : digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
    
By: Quest Software     Published Date: Jul 28, 2011

In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.

Tags : quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.

Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.