Authentication White Papers

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 176 - 200 of 263Sort Results By: Published Date | Title | Company Name
By: Iovation     Published Date: Sep 25, 2009

One of the world's largest MMORPG publishers uses iovation to keep their games safe for their valued players, and the fraudsters out.

Tags : iovation, mmorpg, reputationmanager, online game development and publishing, trickster online revolution, grand chase and pangya, player violations of terms of service, spam
    
By: SonicWall     Published Date: Sep 10, 2009

Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!

Tags : sonicwall, free pcmagcast webinar, unified threat management, a different, efficient, costly bandwith, consolidating multiple solutions, run bandwidth on your web 2.0 apps
    
By: McAfee Inc     Published Date: Aug 19, 2009

Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.

Tags : mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools
    
By: Raritan Inc.     Published Date: Mar 05, 2009

This White Paper examines these considerations in greater detail and defines best practices when evaluating and deploying a Smart Card Authentication solution.

Tags : power distribution unit, raritan, pdu, power monitoring, environmental monitoring, data center power, data center monitoring, monitor power
    
By: LockLizard     Published Date: Dec 08, 2008

This paper covers why intellectual property law is ineffective in protecting the rights of small authors and publishers. It covers intellectual property rights (IPR), licensing controls, copyright, and copyright protection.

Tags : intellectual property law, locklizard, intellectual property rights, licensing controls, copyright protection, security, application security, authentication
    
By: thawte     Published Date: Aug 27, 2008

Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.

Tags : thawte, ssl, secure socket, authentication, identity management, identification
    
By: Entrust     Published Date: Jul 30, 2008

Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.

Tags : layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam
    
By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008

As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.

Tags : digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki
    
By: IDology     Published Date: Feb 11, 2008

There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?

Tags : identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
    
By: Secure Computing     Published Date: Jan 25, 2008

This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.

Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
By: Secure Computing     Published Date: Jan 25, 2008

Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.

Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
By: Secure Computing     Published Date: Jan 25, 2008

In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.

Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
By: Aveksa     Published Date: Dec 07, 2007

Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.

Tags : access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
By: Motorola     Published Date: Aug 09, 2007

Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.

Tags : mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost
    
By: Tripwire     Published Date: Jul 05, 2007

Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.

Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
By: Tripwire     Published Date: Jul 05, 2007

Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.

Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
By: Tripwire     Published Date: Nov 30, 1999

This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.

Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
By: Venafi     Published Date: Aug 07, 2015

Read this paper and discover how to reduce risk of SSH key misuse and develop a strategy to manage and secure SSH keys.

Tags : ssh, security, reduce risk, authentication, secure ssh keys, security application, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 20, 2015

Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
By: McAfee     Published Date: Jan 20, 2015

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, networking
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.

Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, intrusion prevention, mobile workers
    
By: Mimecast     Published Date: Jun 04, 2013

With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.

Tags : email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam
    
By: SafeNet     Published Date: Mar 29, 2013

The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.

Tags : authentication, byod, mobile workforce, it security, key management
    
By: Websense     Published Date: Feb 26, 2013

Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.

Tags : security, appliance, detection, blocking, malware, threats, sandboxing, forensic reporting
    
By: IBM     Published Date: Jan 25, 2013

At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.

Tags : risk management, reputational management, enterprise, threat prevention, access control, anti spam, anti spyware, anti virus
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.