authenticate

(redirected from authenticates)
Also found in: Dictionary, Legal, Encyclopedia.
  • verb

Synonyms for authenticate

Synonyms for authenticate

Words related to authenticate

establish the authenticity of something

References in periodicals archive ?
Using BioPassword to monitor and authenticate users, organizations can quickly and cost-effectively implement secure access, comply with regulatory requirements, and reduce the risks of fraud.
Now with BioPassword Internet Edition, the company's proven keystroke dynamics technology is extended to authenticate users over the Internet to prevent online fraud as well as authenticate the credentials of customers, partners and employees across the enterprise.
Users simply approach the computer equipped with a standard web camera, and FastAccess biometrically authenticates them and logs them on.
Handsets can automatically authenticate to the hot spot and make and receive VoIP calls on Wi-Fi.
Winner of the "Best of Show," award at Macworld, CRYPTOCard positively authenticates a user's identity by coupling something in the user's possession (a smart card, hardware token, or software token), with something the user knows (their PIN), and provides centralized authentication for all physical and network access regardless of network infrastructure or user location.
The user simply logs on through the graphical user interface, enters their PIN & authenticates against the CRYPTO-Server - remove card, display manager (KDM, GDM, XDM) logon locks station.
Winner of the "Best of Show," award at Macworld and the "Best Security Product," at Comdex, CRYPTOCard positively authenticates a user's identity by coupling something in the user's possession (a smart card, hardware token, or software token), with something the user knows (their PIN), and provides centralized authentication for all physical and network access regardless of network infrastructure or user location.
Winner of the "Best of Show," award at Macworld 2004, CRYPTOCard positively authenticates a user's identity by coupling something in the user's possession (a smart card, hardware token, or software token), with something the user knows (their PIN), and provides centralized authentication for all physical and network access regardless of network infrastructure or user location.
Unlike legacy network systems such as those provided free in network operating systems, Meta IP quarantines all computers trying to gain access to core network services while it authenticates them and makes sure they are safe to access the network.
All failures to authenticate, or detection of systems that are not properly patched, are immediately logged, and alerts can be sent to ensure that the organizations regulatory and IT compliance objectives are met.
An organization cannot guarantee system security if it cannot authenticate each individual user, and CRYPTO-Server 6.
Full browser ?