• How 2FA security bolsters user authentication

    IT pros can limit their exposure by solidifying user authentication. One popular option is to implement two-factor authentication, or 2FA, security on logins.

    rhsheldon485 pointsBadges:
  • Why mobile user authentication is more important than ever

    Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands.

    Craig Mathias800 pointsBadges:
  • mobile authentication

    Mobile authentication is the verification of a user’s identity through the use a mobile device and one or more authentication methods for secure access.

    Margaret Rouse3,160 pointsBadges:
  • The fundamentals of MFA: Procuring multifactor authentication

    Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.

    searchsecurity21,410 pointsBadges:
  • image replay attack

    An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology implementations.

    Margaret Rouse3,160 pointsBadges:
  • Has your company considered two-factor authentication as a way to boost security?

    rhsheldon485 pointsBadges:
  • grid authentication

    Grid authentication is a method of ensuring that an end user is who he claims to be by requiring him to enter values from specific cells in a grid whose content should be only accessible to him and the service provider. Because the grid consists of letters and numbers in rows and columns, the...

    Margaret Rouse3,160 pointsBadges:
  • claims-based identity

    Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity’s specific information while providing data that authorizes them for appropriate and relevant interactions.

    Margaret Rouse3,160 pointsBadges:
  • universal authentication

    Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times.

    Margaret Rouse3,160 pointsBadges:
  • out-of-band authentication

    Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial institutions and other organizations with high...

    Margaret Rouse3,160 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following