IT Management  >   Systems Operations  >   Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Authentication, Authorization and Accounting, 3A, Access Authentication and Authorization, Administration (Security), Authentication, Authorization, and Accounting
DEFINITION: Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. These combined processes are considered important for effective network management and security.As the first process, authentication provides a way of identifying a  … 
Definition continues below.
AAA Multimedia (View All Report Types)
26 - 30 of 30 Matches Previous Page  |  Next Page
The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Vulnerability Management Security School
sponsored by
VIRTUAL ENVIRONMENT: Kevin Beaver offers guidance on capabilities you may want to have when addressing vulnerabilities, for example support for authenticated vulnerability scans. He also looks at the current state of capabilities for remediation.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014

The Business Case for Tokenization
sponsored by Patrick Townsend Security Solutions
PODCAST: Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend, Townsend Security Founder and CTO, explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.
Posted: 09 Aug 2010 | Premiered: Aug 9, 2010

Patrick Townsend Security Solutions

The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST: View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011

SafeNet, Inc.

Trusted Computing: Establishing Device Authentication
sponsored by Wave Systems Corp.
VIDEOCAST: View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.
26 - 30 of 30 Matches Previous Page    1 2    Next Page
AAA DEFINITION (continued): …  user, typically by having the user enter a valid user name and valid password before access is granted. The process of authentication is based on each user having a unique set of criteria for gaining access. The AAA server compares a user's authentication credentials with other user credentials stored in a database. If the credentials match, the user is granted access to the network. If the credentials are at variance, authentication fails and network access is denied.Following authentication, a user must gain authorization for doing certain tasks. After logging into a system, for instance, the … 
AAA definition sponsored by, powered by an online computer dictionary
Browse by Report Type:
AAA White Papers | AAA Multimedia | AAA IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement