Sunday, September 30, 2018

📖 Get the Complete Guide to WAN Architecture & Design

Hi David,

Top networking analyst Dr. Jim Metzler outlines the major components of any project plan for evaluating new WAN solutions in his must-read "Guide to WAN Architecture and Design". According to Metzler, "only a third of organizations are either very satisfied or completely satisfied with their current WAN architecture."

Get it now to learn all you need to know about the most current statistics, trends, and analysis regarding the State of the WAN in 2018.

Download-dark.png

Regards,

Ashley Freeman
Senior Business Development Manager

Logo-sig.jpgTwitter-sig.jpg Linkedin-sig.jpg .

This email was sent to dasmith1973.blog@blogger.com. If you no longer wish to receive these emails you may unsubscribe at any time.

Saturday, September 29, 2018

📖 Get the Complete Guide to WAN Architecture & Design

Hi David,

Top networking analyst Dr. Jim Metzler outlines the major components of any project plan for evaluating new WAN solutions in his must-read "Guide to WAN Architecture and Design". According to Metzler, "only a third of organizations are either very satisfied or completely satisfied with their current WAN architecture."

Get it now to learn all you need to know about the most current statistics, trends, and analysis regarding the State of the WAN in 2018.

Download-dark.png

Regards,

Ashley Freeman
Senior Business Development Manager

Logo-sig.jpgTwitter-sig.jpg Linkedin-sig.jpg .

This email was sent to dasmith1973.blog@blogger.com. If you no longer wish to receive these emails you may unsubscribe at any time.

Friday, September 28, 2018

Word of the Day: multifactor authentication (MFA)

Word of the Day WhatIs.com
Daily updates on the latest technology terms | September 28, 2018
multifactor authentication (MFA)

Multifactor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.

Multifactor authentication combines two or more independent credentials: what the user knows (password), what the user has (security token) and what the user is (biometric verification). The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to access a target such as a physical location, computing device, network or database. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target.

Typical MFA scenarios include:

  • Swiping a card and entering a PIN.
  • Logging into a website and being requested to enter an additional one-time password (OTP) that the website's authentication server sends to the requester's phone or email address.
  • Downloading a VPN client with a valid digital certificate and logging into the VPN before being granted access to a network.
  • Swiping a card, scanning a fingerprint and answering a security question.
  • Attaching a USB hardware token to a desktop that generates a one-time passcode and using the one-time passcode to log into a VPN client.

Background

One of the largest problems with traditional user ID and password login is the need to maintain a password database. Whether encrypted or not, if the database is captured it provides an attacker with a source to verify his guesses at speeds limited only by his hardware resources. Given enough time, a captured password database will fall.

As processing speeds of CPUs have increased, brute force attacks have become a real threat. Further developments like GPGPU password cracking and rainbow tables have provided similar advantages for attackers. GPGPU cracking, for example, can produce more than 500,000,000 passwords per second, even on lower end gaming hardware. Depending on the particular software, rainbow tables can be used to crack 14-character alphanumeric passwords in about 160 seconds. Now purpose-built FPGA cards, like those used by security agencies, offer ten times that performance at a minuscule fraction of GPU power draw. A password database alone doesn't stand a chance against such methods when it is a real target of interest.

In the past, MFA systems typically relied upon two-factor authentication. Increasingly, vendors are using the label "multifactor" to describe any authentication scheme that requires more than one identity credential. Continue reading...

Quote of the Day

 

"Although not foolproof, the use of multi-factor authentication schemes can greatly reduce the chances of account compromise." - Craig Young

Learning Center

 

State Department data breach exposes employee info
A State Department data breach compromised the agency's unclassified email system and led to the exposure of employee data and one expert said the issue may have been a lack of multi-factor authentication.

Pros and cons of a multi-factor authentication mobile app
A multi-factor authentication mobile app is more secure than an app that relies solely on passwords. Determine the pros and cons before an implementation.

What are some useful multifactor authentication examples?
Our expert explains multifactor authentication examples in healthcare settings and looks at why this technology is useful for protecting patient data.

How to manage multi-factor authentication for Office 365
MFA is a layered approach to security that exceeds the traditional username/password method. Here's how to manage multi-factor authentication for Office 365.

Explore two major user authentication methods
Biometric and multifactor authentication may be better than traditional user authentication methods, but neither approach to identity management is perfect. Review the benefits and pitfalls to discover which option works for your organization.

Quiz Yourself

 
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

Developers set sights on improved Jenkins-Kubernetes integration

Application Development Digest
A roundup of application development content from TechTarget's network | September 28, 2018
TechTarget
FEATURED STORY
Jenkins on Kubernetes is promising, but integration needs work

By Beth Pariseau, Senior News Writer

Jenkins and Kubernetes are a natural fit for automated application development and delivery, and the open source community has plans to improve how Jenkins runs on containers.

(SearchITOperations.com)

Advertisement
NEWS
 

BPM development goes beyond low-code with AI, RPA

BPM vendors are enhancing their low-code process development tool sets with AI and robotic process automation.

(SearchSoftwareQuality.com)

 
Google Cloud CTO talks Cloud Services Platform hybrid play
In this Q&A, Google Cloud CTO Brian Stevens envisions an IT landscape where enterprises can more easily develop and manage apps that span on premises and the cloud. Hint: Kubernetes plays a big role.
(SearchCloudComputing.com)
EXPERT ADVICE
 
How to manage distributed apps built on microservices

Distributed apps benefit from the architectural benefits of microservices, and progressions in modern container technology negate some traditional drawbacks.

(SearchMicroservices.com)

 
How to fix a common JFrog Artifactory startup error

So, every time you run the tool JFrog you get an error that says "could not reserve enough space for 2097152KB object heap." Luckily, there's an easy fix.

(TheServerSide.com)

 
Words to go: QA testing methodologies

To be an effective tester, you must know a vast -- if not unwieldy -- number of QA testing methodologies and terms. Keep this cheat sheet of testing terms handy.

(SearchSoftwareQuality.com)

 
Put quality before quantity with integration tests

Too many organizations overemphasize test case numbers and lose track of how costly the process can become. Increase test efficiency to please users and owners.

(SearchSoftwareQuality.com)

 
Grasp container basics to plan enterprise adoption

To transition from virtualization that mimics hardware to a new level of portable, isolated workloads, absorb key tenets of containers and how they differ from VMs.

(SearchITOperations.com)

 
How Java EE development has kept up with microservices

Many consider Java EE a legacy approach. Yet, new specifications, frameworks and other support enable the tech to fit into a microservices architecture.

(SearchMicroservices.com)

About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Application Development Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Application Development Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

The path to a mature application security program

TechTarget
Business Technology Research     September 28, 2018
TechTarget
IN THIS ISSUE
The path to a mature application security program
SPONSORED BY: Veracode, Inc.
Application security a critical priority today. Learn how to address application security concerns while also gaining a competitive advantage at the same time in this video.
Switches: 5 reasons why you should upgrade
SPONSORED BY: D-Link
For IT network pros, managed switches optimize highly demanding infrastructures, giving you greater control and more reliable connections. In this resource, discover the top 5 reasons you should upgrade your switches.
How to automate workflows and build powerful business processes
SPONSORED BY: K2
Many companies predict that it could take up to 3 to 5 years to improve their business processes significantly with automation – and that's simply too long in a world as face-paced as this one. Discover how to accelerate business process automation with a platform that provides integrated LOB systems, flexible process models, and more.
The state of app development 2018
SPONSORED BY: OutSystems
Download this report for a look into the state of application development and learn how your organization can overcome some of the biggest challenges to application development today.
Beyond WAN: Building a software-defined, cloud-based network
SPONSORED BY: Cato Networks
Find out how to create a software-defined and cloud-based secure enterprise network so that you can accommodate an increasingly mobile workforce and rising cloud adoption.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget