Authentication White Papers

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 1 - 25 of 263Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Aug 04, 2015

This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Adobe     Published Date: Aug 04, 2015

The rapid adoption of e-signature solutions and the continued strong growth in the market for services and software is driven by several factors:

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Adobe     Published Date: Aug 04, 2015

Learn how e-signatures remove the last barrier between a hybrid paper to digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract.

Tags : electronic signatures, digital signatures, paper to digital, business intelligence, database, e-signatures, online signatures, authentication
    
By: Adobe     Published Date: Aug 04, 2015

Learn how technologies like e-signatures and document management are drastically improving HR processes.

Tags : e-signatures, electronic signatures, digital signatures, document management, improving hr with digital signatures, human resources, authentication, identity management
    
By: Adobe     Published Date: Aug 04, 2015

This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.

Tags : e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement, authentication, identity management, content management system
    
By: Venafi     Published Date: Jul 27, 2015

Read this solution brief to learn how Security Operations teams can eliminate outages.

Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
By: CDW     Published Date: Jul 08, 2015

Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.

Tags : dlp, data loss, security, best practices, access control, authentication, identity management, security management
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: Venafi     Published Date: Aug 10, 2015

This whitepaper reveals why enterprises are vulnerable to trust-based attacks.

Tags : cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity, anti spam, anti spyware
    
By: Venafi     Published Date: Aug 10, 2015

The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.

Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network, access control, anti spam
    
By: Venafi     Published Date: Aug 07, 2015

This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.

Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
    
By: Entrust PKI     Published Date: Jul 21, 2015

Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.

Tags : internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure
    
By: Acronis EMEA     Published Date: May 19, 2015

The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.

Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this datasheet to discover the main benefits of Acronis Access Advanced.

Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
    
By: Document Cloud for Enterprise     Published Date: Apr 23, 2015

This white paper explores several factors relating to the legality of e-signatures in various applications.

Tags : esign law, e-signatures, electronic signatures, digital signatures, e-signature solutions, esign act, law makes digital signatures legal, authentication
    
By: IBM     Published Date: Apr 09, 2015

This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.

Tags : ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.

Tags : esignature technologies, mcafee, salesforce, linkedin, esignature solutions, authentication, identity management, return on investment
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the EU e-signature law and the benefits of knowing about this law for the business.

Tags : esignature law, electronic signature technology laws, eu esignature law, docusign, identifying the signer, identification signer, authentication, identity management
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, application security, authentication
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, access control, application security
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.

Tags : identity-based security, business protection, identity, security solutions, new trends to secure business, access control, application security, authentication
    
By: CA Technologies     Published Date: Jan 09, 2015

This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.

Tags : byod, identity, byoid benefits, access control, application security, authentication, identity management, intrusion prevention
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.

Tags : authentication, security, risk-based authentication, network security, access control, password management, security management, web service security
    
By: Bazaarvoice     Published Date: Nov 05, 2014

This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.

Tags : bazaarvoice, customer loyalty, authemticity, customer relationships, authentic users, generated content, best practices, inauthentic practices
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.