Discussions

  • unique identifier (UID)

    A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.

    Margaret Rouse3,030 pointsBadges:
  • universal authentication

    Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times.

    Margaret Rouse3,030 pointsBadges:
  • full-disk encryption (FDE)

    What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.

    Margaret Rouse3,030 pointsBadges:
  • out-of-band authentication

    Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial institutions and other organizations with high...

    Margaret Rouse3,030 pointsBadges:
  • risk-based authentication (RBA)

    Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised. As the level of risk increases, the authentication process becomes more comprehensive and...

    Margaret Rouse3,030 pointsBadges:
  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. The FIDO standard supports multifactor authentication and strong features like biometrics.

    Margaret Rouse3,030 pointsBadges:
  • SMS gateway

    An SMS gateway is a Web site that allow users to send SMS messages from a Web browswer to people within the cell served by that gateway. An SMS gateway can also serve as an international gateway for users with roaming capability, allowing SMS communication away from the home network. (Continued...)

    ITKE352,420 pointsBadges:
  • Restoring data remains a challenge, but new technologies emerge

    The lines between backup, DR, archive, file sync and primary storage blurred in 2014 to streamline processes, reduce redundant copies and help with protecting and restoring data.

    Andrew Burton220 pointsBadges:
  • Top 10 UCC news highlights reveal 2015 trends

    The top 10 UC news highlights of the year point to trends in cloud-based UC, collaboration tools, WebRTC and mobile applications that enterprises can't ignore.

    AntoneGonsalves105 pointsBadges:
  • How the E-Rate program modernization impacts the channel

    Changes to the E-Rate program enable technology upgrades for schools and libraries, spelling more business for MSPs and education-focused resellers.

    jmoore1170 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following