IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access ControlWhite Papers (View All Report Types)
1 - 25 of 357 Matches Previous Page  | Next Page
Creating and Enforcing Advanced Access Policies with Citrix XenApp
sponsored by Citrix
WHITE PAPER: IT needs a more granular way to manage and secure user access the right way for every scenario. Read on to find out how you can secure app delivery and achieve advanced access control with XenApp.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Citrix

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
WHITE PAPER: Discover several security risks of typical enterprise and government PKIs and how higher assurance solutions are vital for security purposes.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Thales Solution for Microsoft Active Directory Certificate Services
sponsored by Thales
WHITE PAPER: Access a seamless solution that issues, manages, and validates digital identities that are used to verify an individual or a system.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Providing a single source for secure identity solutions
sponsored by HID
WHITE PAPER: Access this white paper to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

HID Global’s Identity Assurance SMB Solution
sponsored by HID
WHITE PAPER: In this resource, explore how a strong authentication method is possible without tokens or any complexity.
Posted: 10 Jul 2014 | Published: 03 May 2013

HID

Establishing Trust in Online Identities
sponsored by HID
WHITE PAPER: Access this white paper to discover strong authentication and credential management solutions and services.
Posted: 09 Jul 2014 | Published: 04 Dec 2012

HID

Enterprise Universal Access One secure credential for logical, physical, local and remote access
sponsored by HID
WHITE PAPER: This white paper explores leading solutions designed to create successful enterprise authentication.
Posted: 09 Jul 2014 | Published: 19 Sep 2013

HID

Enabling a secure and convenient online banking experience
sponsored by HID
WHITE PAPER: In this white paper, discover security solutions that are scalable, secure and simple to implement for online banking.
Posted: 09 Jul 2014 | Published: 03 May 2013

HID

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
WHITE PAPER: In this white paper, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID

ActivID® Authentication Appliance for Enterprise
sponsored by HID
WHITE PAPER: In this white paper, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Identity Management Tech Brief
sponsored by Red Hat
WHITE PAPER: Read this whitepaper to learn more about domain controllers with Linux for better identity and access management.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Red Hat

MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

Only Bitglass Secures Cloud And Mobile Yet Respects User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Security in the Cloud for SAP HANA
sponsored by Vormetric
WHITE PAPER: This white paper features a data security architecture that offers encryption and granular access controls to better protect SAP HANA cloud deployments.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Vormetric

Top Five Reasons to Use the RadiantOne Federated Identity System With SharePoint
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource highlights the benefits of a federated identity service for organizations with scalable user environments.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Radiant Logic, Inc.

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Simple, Strategic and One Login for Enterprise, Cloud and Mobile
sponsored by i-Sprint Innovations
WHITE PAPER: This resource addresses the benefits that SSO has to offer for businesses.
Posted: 02 Jun 2014 | Published: 31 Dec 2013

i-Sprint Innovations

A Security Survey of Strong Authentication Technologies
sponsored by SafeNet, Inc.
WHITE PAPER: This resource highlights the most commonly used authentication methods, and details the strengths and weaknesses of each to help you decide which solution is best for you.
Posted: 30 May 2014 | Published: 21 Mar 2014

SafeNet, Inc.

Trusted Access:Mobile
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This exclusive paper discusses a mobile access solution that provides secure, reliable, and efficient access to critical data and applications from any mobile device.
Posted: 30 May 2014 | Published: 30 May 2014

Raytheon Trusted Computer Solutions

Desktop Transfer Client: Exchange Files with Any Trading Partner
sponsored by GlobalScape
WHITE PAPER: In this white paper, explore a desktop file transfer solution that only requires Internet connection and offers increased flexibility in file sharing without added costs.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.
1 - 25 of 357 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement