Enterprise Identity and Access Management

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • BYOI (bring your own identity)

    BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure standard to verify that a public key belongs to the user, computer or service identity contained within the certificate.

  • John the Ripper

    John the Ripper is a popular free password cracking tool that combines several different cracking programs and runs in both brute force and dictionary attack modes. Originally developed for Unix-derived systems, the software is now available for most platforms.

  • password entropy

    Password entropy is a measurement of how unpredictable a password is. Password entropy is based on the character set used (which is expansible by using lowercase, uppercase, numbers as well as symbols) as well as password length. Password entropy predicts how difficult a given password would be to crack through guessing, brute force cracking, dictionary attacks or other common methods.

  • Malware defense: Mitigating malware hiding as digitally signed software

    Malware leveraging PKI and digital signatures is increasingly common. Nick Lewis explains the threat and five key defense strategies.

  • Using the Google Transparency Report to enhance website blacklisting

    Threats expert Nick Lewis explores whether Google's Transparency Report can be used to enhance blacklisting of malicious websites in the enterprise.

  • CSR (Certificate Signing Request)

    A Certificate Signing Request or CSR is a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA) validating the information required by the CA in order for it to issue a certificate.

  • Next-generation authentication technologies emerge to restore balance

    Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication technologies. This handbook discusses emerging authentication technologies that reduce organizational risk while limiting user inconvenience.

  • Adaptive authentication: An introduction to risk-based authentication

    Enterprise use of adaptive authentication is growing internally and for Web applications. Brad Causey details the allure of risk-based authentication.

  • Analysis: Enterprise password management tools have room to improve

    Explore the differences between consumer and enterprise password management products and learn pros and cons about the latest tools.

  • VIEW MORE ON : Web Authentication and Access Control