IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control White Papers (View All Report Types)
1 - 25 of 381 Matches Previous Page  |  Next Page
Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Deploy an Enterprise Mobility Gateway to Optimize Access Control
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Securing the Enterprise with an ADC
sponsored by A10 Networks
WHITE PAPER: To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

A10 Networks

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.
Posted: 20 Jan 2016 | Published: 30 Jun 2015

SecureAuth

Using Identity to Create Next Generation, Risk-based Access Management
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.
Posted: 20 Jan 2016 | Published: 31 Aug 2015

SecureAuth

Evaluating Standout Services in the Cloud Identity and Access Management Sector
sponsored by SecureAuth
WHITE PAPER: If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.
Posted: 20 Jan 2016 | Published: 31 Mar 2015

SecureAuth

Enhacing IAM and Authentication with Threat Intelligence
sponsored by SecureAuth
WHITE PAPER: What happens when two authentication leaders unite to create a new platform to advance threat detection? You'll have to read this white paper to find out. Read on now to learn how to use keystroke analysis to detect signs of compromised credentials earlier.
Posted: 18 Jan 2016 | Published: 17 Nov 2015

SecureAuth

The Insider Threat: From Risk to Detection
sponsored by Interset Software Inc.
WHITE PAPER: In this white paper, you will learn the 3 most common types of insider attacks and how to build an effective defense against them.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

Interset Software Inc.

Privileged Account Management Security Action Plan
sponsored by Thycotic
WHITE PAPER: This white paper explains why your organization cannot continue operating without privileged account management as the risks for a crippling data breach skyrocket each day without it. View now to learn the challenges of privileged account management and what you can do to overcome them to improve security.
Posted: 08 Jan 2016 | Published: 05 Nov 2015

Thycotic

Privileged Password Security Policy Template
sponsored by Thycotic
WHITE PAPER: This white paper offers a security policy template to enable your organization to secure user access accounts from basic profiles to advanced privileges. View now to learn how to comply with governance requirements and enhance IAM security.
Posted: 06 Jan 2016 | Published: 30 Dec 2015

Thycotic

Privileged Access Management: Why Sudo in Longer Enough
sponsored by FoxT
WHITE PAPER: This white paper presents Sudo's shortcomings for identity and access management of privileged accounts and what you can do to guarantee secure authentication for users. Read on to learn more.
Posted: 06 Jan 2016 | Published: 23 Dec 2015

FoxT

Taming the Beast- Controlling SSH for Security and Compliance
sponsored by FoxT
WHITE PAPER: Are SSH keys the saviors of identity management and access security for your organizations? With several different styles of keys, it's imperative you know the differences and guidelines to using them. Access this white paper to learn more about SSH keys and taking the next step to centralizing SSH session access control to boost security.
Posted: 05 Jan 2016 | Published: 11 Nov 2015

FoxT

Puppet: The Good, Bad, and Ugly for Configuration Management & Security
sponsored by FoxT
WHITE PAPER: This white paper talks you through the strengths and vulnerabilities of running Puppet in your organization for IAM and steps to take to improve security. Read on to learn how to scale Puppet with your user base and keep employees secure.
Posted: 05 Jan 2016 | Published: 02 Dec 2015

FoxT

Combating the Insider Threat: Your Guide to Staying Secure
sponsored by Lancope
WHITE PAPER: This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Best Practices for UNIX/LINUX Priviledged Identity and Access Management
sponsored by FoxT
WHITE PAPER: On Unix/Linux OSs, the all-powerful "root" privilege is the key to your organization facing a serious breach. This white paper explores the importance of limiting access privileges and the vulnerabilities root privileges create. Read on and learn Unix/Linux OS best practices
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

OPM Breach: Why Security Needs to be a Priority
sponsored by FoxT
WHITE PAPER: Learn more about the political battle security teams are losing and why root access requirements leave your organization open to an IAM hack in this white paper. Find out how to granularly manage access accounts and control privileges across diverse operating systems.
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

Hacker Survey Report: The Flaws in IAM
sponsored by Thycotic
WHITE PAPER: In this white paper, examine the shocking truths about identity and access management (IAM) flaws and the war against hackers. Learn 4 steps to stronger privileged account management.
Posted: 04 Jan 2016 | Published: 30 Dec 2015

Thycotic
1 - 25 of 381 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement