Authentication White Papers

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 176 - 200 of 250Sort Results By: Published Date | Title | Company Name
By: Aveksa     Published Date: Dec 07, 2007

Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.

Tags : access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
By: Motorola     Published Date: Aug 09, 2007

Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.

Tags : mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost
    
By: Tripwire     Published Date: Jul 05, 2007

Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.

Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
By: Tripwire     Published Date: Jul 05, 2007

Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.

Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
By: Tripwire     Published Date: Nov 30, 1999

This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.

Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
By: McAfee     Published Date: Jan 20, 2015

Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
By: McAfee     Published Date: Jan 20, 2015

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, networking
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.

Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, intrusion prevention, mobile workers
    
By: Mimecast     Published Date: Jun 04, 2013

With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.

Tags : email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam
    
By: SafeNet     Published Date: Mar 29, 2013

The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.

Tags : authentication, byod, mobile workforce, it security, key management
    
By: Websense     Published Date: Feb 26, 2013

Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.

Tags : security, appliance, detection, blocking, malware, threats, sandboxing, forensic reporting
    
By: IBM     Published Date: Jan 25, 2013

At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.

Tags : risk management, reputational management, enterprise, threat prevention, access control, anti spam, anti spyware, anti virus
    
By: Symantec     Published Date: Oct 02, 2012

Making the Best Choice When Considering Your Online Security Options

Tags : access control, anti spyware, anti virus, authentication, business continuity
    
By: Courion     Published Date: Sep 29, 2012

This interactive session will explore the various roles and processes for managing user access, the benefits that automation can provide to better address this issue and provide guidance for implementing an effective strategy using a risk-driven approach.

Tags : courion, identity management, access management, security, it security, technology, automation, access control
    
By: Dell Software     Published Date: Jul 18, 2012

Take the Active Directory management quiz!

Tags : quiz, active sirectory, microsoft, directory service, server, domain controller, enforce security, powershell
    
By: EMC Corporation     Published Date: Mar 08, 2012

This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.

Tags : leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention
    
By: Bit9     Published Date: Jan 17, 2012

Learn how IT teams can protect against spear phishing tactics. Harry Sverdlove, chief technology officer of Bit9 offers a frank discussion about spear phishing - the most common technique used in today's advanced attacks.

Tags : bit9, technology, security, cyber attack, phishing, intrusion protection, access control, authentication
    
By: Bit9     Published Date: Jan 17, 2012

When handling sensitive cardholder data, organizations need to be sure their POS machines, kiosks, ATMs and servers have the proper solutions to stop advanced attacks. Read how one retail grocery chain proactively secures its endpoints with Bit9 Parity's advanced threat protection.

Tags : bit9, technology, security, protection, intrustion detection, security policy, vulnerability management, access control
    
By: Bit9     Published Date: Jan 17, 2012

Learn how this New England hospital, breached multiple times by targeted attacks, put an end to the malware with Bit9 Parity. Their IT team can now identify malware and secure PCs and workstations -protecting patient care and privacy.

Tags : bit9, technology, hackers, intrusion detection, intrustion protection, security, security policy, access control
    
By: Lumension     Published Date: Jan 11, 2012

The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: Symantec     Published Date: Jan 04, 2012

Read this white paper and learn how the proper IT security policies can actually drive more sales.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Jan 04, 2012

This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.