• full-disk encryption (FDE)

    What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.

    Margaret Rouse3,020 pointsBadges:
  • out-of-band authentication

    Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial institutions and other organizations with high...

    Margaret Rouse3,020 pointsBadges:
  • risk-based authentication (RBA)

    Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised. As the level of risk increases, the authentication process becomes more comprehensive and...

    Margaret Rouse3,020 pointsBadges:
  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. The FIDO standard supports multifactor authentication and strong features like biometrics.

    Margaret Rouse3,020 pointsBadges:
  • SMS gateway

    An SMS gateway is a Web site that allow users to send SMS messages from a Web browswer to people within the cell served by that gateway. An SMS gateway can also serve as an international gateway for users with roaming capability, allowing SMS communication away from the home network. (Continued...)

    ITKE352,420 pointsBadges:
  • Restoring data remains a challenge, but new technologies emerge

    The lines between backup, DR, archive, file sync and primary storage blurred in 2014 to streamline processes, reduce redundant copies and help with protecting and restoring data.

    Andrew Burton220 pointsBadges:
  • Top 10 UCC news highlights reveal 2015 trends

    The top 10 UC news highlights of the year point to trends in cloud-based UC, collaboration tools, WebRTC and mobile applications that enterprises can't ignore.

    AntoneGonsalves105 pointsBadges:
  • How the E-Rate program modernization impacts the channel

    Changes to the E-Rate program enable technology upgrades for schools and libraries, spelling more business for MSPs and education-focused resellers.

    jmoore1170 pointsBadges:
  • DNS rebinding defenses still necessary, thanks to Web 2.0

    The scripted content and plug-ins of today's Web 2.0 websites have opened enterprise networks to an old threat: DNS rebinding. The attacks can create serious problems for your enterprise network, but the defenses are easier than you think. Security Corner's Ken Harthun explains the new types of DNS...

    searchsecurity21,395 pointsBadges:
  • Implementing IDS/IPS technologies: Managing politics and accountability

    Find out how one security solution provider handled implementing IDS/IPS technologies in a customer business. Ken Harthun explains how to accommodate the IDS/IPS needs of a customer while overcoming end-user reluctance.

    searchsecurity21,395 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.