"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Authentication

In computer security, Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program. A blind credential, in contrast, does not establish identity at all, but only a narrow right or status of the user or program.
Results 226 - 250 of 291Sort Results By: Published Date | Title | Company Name
White Paper Published By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection
    
McAfee
White Paper Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
    
Imprivata
White Paper Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention
    
Mimecast
White Paper Published By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
Case Study Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware
    
Websense
White Paper Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control
    
IBM
White Paper Published By: Symantec     Published Date: Oct 02, 2012
Making the Best Choice When Considering Your Online Security Options
Tags : 
access control, authentication, business continuity
    
Symantec
Webinar Published By: Courion     Published Date: Sep 29, 2012
This interactive session will explore the various roles and processes for managing user access, the benefits that automation can provide to better address this issue and provide guidance for implementing an effective strategy using a risk-driven approach.
Tags : 
courion, identity management, access management, security, it security
    
Courion
White Paper Published By: Dell Software     Published Date: Jul 18, 2012
Take the Active Directory management quiz!
Tags : 
quiz, active sirectory, microsoft, directory service, server
    
Dell Software
White Paper Published By: EMC Corporation     Published Date: Mar 08, 2012
This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.
Tags : 
leveraging, emc, deduplication, solutions, backup
    
EMC Corporation
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how the proper IT security policies can actually drive more sales.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses
    
Blue Coat Systems
White Paper Published By: Citrix Systems     Published Date: Sep 08, 2011
Get flexible app delivery capacity in your datacenter that easily scales as demand grows. Free "Pay-As-You-Grow" guide from Citrix shows you how.
Tags : 
citrix, pay-as-you-grow, network elasticity, netscaler, new applications
    
Citrix Systems
White Paper Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring
    
NetIQ
White Paper Published By: Distributed Management Systems     Published Date: Jul 03, 2011
White Paper describing a new approach to multi-factor authentication for the Cloud
Tags : 
mutual authentication for the cloud, authentication at application level, access control, application security, authentication
    
Distributed Management Systems
White Paper Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap
    
Radiant Logic, Inc
White Paper Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords
    
Confident Technologies
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: VeriSign     Published Date: Feb 10, 2011
What smart companies are doing to build trust and use it to create competitive advantage online.
Tags : 
verisign, trust online, website, loyalty, ev ssl
    
VeriSign
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory