Authentication White Papers

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 26 - 50 of 236Sort Results By: Published Date | Title | Company Name
By: EMC     Published Date: Apr 18, 2013

The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.

Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware
    
By: EMC     Published Date: Apr 18, 2013

Read the Forrester Report: The Total Economic Impact of RSA Archer IT GRC and you'll be eligible to receive a free consultation from an RSA GRC expert who will calculate the projected ROI for your organization.

Tags : grc, rsa, archer, roi, compliance, risk, risk management, anti spam
    
By: EMC     Published Date: Apr 18, 2013

See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.

Tags : risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc, authentication
    
By: Kaseya     Published Date: Apr 04, 2013

A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.

Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
By: Symantec     Published Date: Apr 04, 2013

How Code Signing Can Bolster Security for Mobile Applications

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: Symantec     Published Date: Apr 04, 2013

Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?

Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security, access control
    
By: McAfee     Published Date: Mar 07, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: Bit9     Published Date: Mar 07, 2013

In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.

Tags : data breaches, data center, security, cyber threats, server, business continuity, access control, anti spam
    
By: McAfee     Published Date: Feb 06, 2013

This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.

Tags : security management platform, siem, log management, security management 2.0, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Feb 06, 2013

This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.

Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
    
By: McAfee     Published Date: Feb 06, 2013

Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.

Tags : big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected, anti spam, anti spyware
    
By: McAfee     Published Date: Feb 06, 2013

Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.

Tags : big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence
    
By: McAfee     Published Date: Feb 06, 2013

Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, anti spam, anti spyware, anti virus
    
By: McAfee     Published Date: Feb 06, 2013

This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam
    
By: Symantec     Published Date: Jan 31, 2013

PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.

Tags : endpoint protection, security, performance test, comparison, windows 8, anti spam, anti spyware, anti virus
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This report details the current state of the security management market and what to expect moving forward.

Tags : security, testing, security controls, security management, tools, siem, access control, anti spam
    
By: HP - Enterprise     Published Date: Jan 24, 2013

Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.

Tags : consumerization, byod, risk management, security, anti spam, anti spyware, anti virus, authentication
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.

Tags : cloud, security, attacks, risk, virtualization, encryption, access control, anti spam
    
By: Lumension     Published Date: Jan 18, 2013

Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.

Tags : security, network security, cyber attacks, access control, anti spam, anti spyware, anti virus, application security
    
By: VASCO     Published Date: Jul 12, 2012

In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."

Tags : vasco, cloud computing, technology, saas applications, authentication, security, access control, security policies
    
By: VASCO     Published Date: Jul 12, 2012

Read more of this whitepaper to learn how strong authentication tools safeguard user login and ensure that only authorized users gain access to confidential patient data.

Tags : vasco, cloud computing, technology, saas applications, authentication, security, access control, security policies
    
By: VASCO     Published Date: Jul 12, 2012

Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.

Tags : vasco, cloud computing, technology, saas applications, authentication, security, security management, application integration
    
By: NetIQ     Published Date: Jun 11, 2012

This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.

Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
By: NetIQ     Published Date: Jun 11, 2012

Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!

Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
By: IBM     Published Date: May 31, 2012

The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a more systematic and proactive approach to addressing security threats and managing compliance requirements. Download the white paper to learn more.

Tags : ibm, cyber terrorism, digital age, c suite, security, technology, business technology, business
    
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.