Authentication White Papers

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 176 - 200 of 237Sort Results By: Published Date | Title | Company Name
By: Courion     Published Date: Sep 29, 2012

This interactive session will explore the various roles and processes for managing user access, the benefits that automation can provide to better address this issue and provide guidance for implementing an effective strategy using a risk-driven approach.

Tags : courion, identity management, access management, security, it security, technology, automation, access control
    
By: Dell Software     Published Date: Jul 18, 2012

Take the Active Directory management quiz!

Tags : quiz, active sirectory, microsoft, directory service, server, domain controller, enforce security, powershell
    
By: EMC Corporation     Published Date: Mar 08, 2012

This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.

Tags : leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention
    
By: Bit9     Published Date: Jan 17, 2012

Learn how IT teams can protect against spear phishing tactics. Harry Sverdlove, chief technology officer of Bit9 offers a frank discussion about spear phishing - the most common technique used in today's advanced attacks.

Tags : bit9, technology, security, cyber attack, phishing, intrusion protection, access control, authentication
    
By: Bit9     Published Date: Jan 17, 2012

When handling sensitive cardholder data, organizations need to be sure their POS machines, kiosks, ATMs and servers have the proper solutions to stop advanced attacks. Read how one retail grocery chain proactively secures its endpoints with Bit9 Parity's advanced threat protection.

Tags : bit9, technology, security, protection, intrustion detection, security policy, vulnerability management, access control
    
By: Bit9     Published Date: Jan 17, 2012

Learn how this New England hospital, breached multiple times by targeted attacks, put an end to the malware with Bit9 Parity. Their IT team can now identify malware and secure PCs and workstations -protecting patient care and privacy.

Tags : bit9, technology, hackers, intrusion detection, intrustion protection, security, security policy, access control
    
By: Lumension     Published Date: Jan 11, 2012

The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: Symantec     Published Date: Jan 04, 2012

Read this white paper and learn how the proper IT security policies can actually drive more sales.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Jan 04, 2012

This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 24, 2011

This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Citrix Systems     Published Date: Sep 08, 2011

Get flexible app delivery capacity in your datacenter that easily scales as demand grows. Free "Pay-As-You-Grow" guide from Citrix shows you how.

Tags : citrix, pay-as-you-grow, network elasticity, netscaler, new applications, delivery capacity, licensing, elasticity
    
By: NetIQ     Published Date: Jul 21, 2011

Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.

Tags : netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc
    
By: Radiant Logic, Inc     Published Date: Mar 21, 2011

How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.

Tags : access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
    
By: Confident Technologies     Published Date: Mar 16, 2011

This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.

Tags : authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp
    
By: Kingston     Published Date: Feb 15, 2011

Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization

Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory
    
By: VeriSign     Published Date: Feb 10, 2011

What smart companies are doing to build trust and use it to create competitive advantage online.

Tags : verisign, trust online, website, loyalty, ev ssl, certificate management, secure sockets layer, certificate authority
    
By: M3 Consulting, Inc.     Published Date: Feb 03, 2011

Offshoring Is a Cost Effective Solution to Your IT Needs

Tags : software design, application development, web design, offshoring, it solutions, consulting, active directory, bandwidth management
    
By: The Bunker     Published Date: Nov 30, 2010

What questions should an organization ask about security and availability when contemplating a cloud computing model

Tags : cloud, security, data centre, sla, continuity, disaster recovery, access control, anti spam
    
By: Gartner, Inc     Published Date: Oct 28, 2010

New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.

Tags : emerging trends, emerging technologies, hype cycle, new technologies, it trends, active directory, bandwidth management, convergence
    
By: TraceSecurity     Published Date: Sep 15, 2010

This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.

Tags : penetration, test, pen, tracesecurity, risk, assessment, social, engineering
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.