"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Authentication

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 176 - 200 of 291Sort Results By: Published Date | Title | Company Name
White Paper Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, security solution, ssl, trust, malicious activity
    
VeriSign, Inc.
White Paper Published By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : 
symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com
    
Symantec.cloud
White Paper Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication
    
Entrust Datacard
White Paper Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen
    
Quest Software
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection
    
DigitalPersona UK
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft
    
DigitalPersona UK
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management
    
DigitalPersona UK
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud
    
DigitalPersona UK
Webinar Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
Webinar Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
Webinar Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Data Center Automation solution.
Tags : 
automation, launchpad, ibm, isms, ibm data center
    
IBM Corporation
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
Protecting data is becoming more and more important and new technologies are making backup and recovery strategies more viable to smaller businesses. Now is the time to create an effective BDR plan or review one already in place - before disaster strikes.
Tags : 
storagecraft, recovery, backup, cloud, strategies
    
StorageCraft® Technology Corporation
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
When it comes to data protection and recovery, many businesses are not as safe as they believe. Read on to find out what you should consider when creating your backup and disaster recovery plan.
Tags : 
storagecraft, recovery, backup, cloud, strategies
    
StorageCraft® Technology Corporation
White Paper Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : 
globalsign, hackalert, blacklisting, malware, drive by downloads
    
Globalsign Inc.
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
Find out about the most effective defense against MitB attacks.
Tags : 
safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle
    
SafeNet
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
Combat Man-in-the-Browser (MiTB) Attacks with an Integrated Solution that Combines Strong Certificate-Based Authentication from SafeNet with an On-board Portable Browser.
Tags : 
safenet financial services, online banking, security, identity protection, etoken ng-flash
    
SafeNet
White Paper Published By: SafeNet     Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
Tags : 
safenet financial services, online banking threats, cyber attack, compliance, financial services providers
    
SafeNet
White Paper Published By: SafeNet     Published Date: Jul 20, 2010
In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!
Tags : 
safenet mobile, sms authentication, remote access, customer satisfaction, tco
    
SafeNet
White Paper Published By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access
    
SafeNet
White Paper Published By: Mocana     Published Date: Jun 18, 2010
Learn how Mocana's NanoSec can speed your product development cycle while providing best-in-class device security for resource-constrained environments. Download the product whitepaper and receive a free trial.
Tags : 
mocana, nanosec, ipsec, embedded devices, product development cycle
    
Mocana
White Paper Published By: Mocana     Published Date: Jun 18, 2010
Mocana's NanoCrypto is one of the smallest, fastest, and most complete cryptography engines designed for embedded systems. Download the NanoCrypto whitepaper and receive a free trial.
Tags : 
mocana, nano crypto, embedded device, security authentication, cryptography engine
    
Mocana
White Paper Published By: ARX (Algorithmic Research)     Published Date: Jun 10, 2010
This white paper outlines the costs associated with a paper-based approval process and can help you establish the Return on Investment (ROI) that your organization can expect by deploying a digital signature solution.
Tags : 
arx, algorithmic research, roi calculation, digital signature, tco
    
ARX (Algorithmic Research)
White Paper Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit
    
Centrify Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory