IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control White Papers (View All Report Types)
1 - 25 of 394 Matches Previous Page  |  Next Page
Delivering the Fastest Clinical Desktop in Healthcare
sponsored by Aventura
WHITE PAPER: This white paper examines how to gain greater control over the clinical desktop. Continue reading to learn how to protect PHI security at all times and maintain a clear audit trail.
Posted: 25 Aug 2015 | Published: 29 Jul 2015

Aventura

The Top B2E Cloud IAM Vendors Revealed
sponsored by Okta
WHITE PAPER: This white paper rates and ranks the top B2E cloud vendors and platforms to simplify your search. Access this helpful resource now to learn the strengths and weaknesses of each offering and the key components to look for when making your decision.
Posted: 25 Aug 2015 | Published: 29 Jun 2015

Okta

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by SafeNet, Inc.
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SafeNet, Inc.

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Content Is the New Perimeter: The Security and Regulatory Drivers for IRM
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the challenges of securing digital information, even when that information resides outside the perimeter.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

IntraLinks, Inc

Global Authentication in Online Financial Services Leadership Award
sponsored by HID
WHITE PAPER: This white paper outlines a 6-step strategy to strengthening authentication to close vulnerabilities and mitigate advanced threats. Continue reading to learn the criteria authentication needs today to secure enterprise data.
Posted: 14 Aug 2015 | Published: 30 Dec 2014

HID

Business Drivers for Next Generation Authentication
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper discusses how today's complex authentication environment impacts users and IT professionals alike, and how you can lessen these impacts without lessening security.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

SafeNet, Inc.

Keys to Balancing Security and Convenience
sponsored by SafeNet, Inc.
WHITE PAPER: This paper examines why the need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

SafeNet, Inc.

An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER: This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014

HID

Assessing the True Cost of Strong Authentication
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, you'll discover how to compare the TCO of on-site authentication vs. cloud-based authentication strategies to determine which is right for your budget. Access this resource now to review the hard costs and soft costs of each approach.
Posted: 12 Aug 2015 | Published: 23 Oct 2012

SafeNet, Inc.

Your Guide to Secure Databases
sponsored by Oracle Corporation
WHITE PAPER: This resource contains tips on enhancing your information security by securing databases directly.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

Oracle Corporation

From Project to Product
sponsored by Red Hat
WHITE PAPER: Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.
Posted: 03 Aug 2015 | Published: 31 Dec 2014

Red Hat

Red Hat Jboss Data Grid Supercharges Modern Applications
sponsored by Red Hat
WHITE PAPER: Read this white paper to learn how to supercharge your modern applications and meet both immediate and long term IT goals.
Posted: 30 Jul 2015 | Published: 30 Jun 2015

Red Hat

One Secure Credential for Logical, Physical, Local, and Remote Access
sponsored by HID
WHITE PAPER: This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.
Posted: 24 Jul 2015 | Published: 19 Sep 2013

HID

6 Criterions for Strong Authentication
sponsored by HID
WHITE PAPER: This white paper presents a 6-step plan to ensure stronger authentication to go beyond basic password methods. Continue reading to learn how to craft a robust authentication strategy without sacrificing user convenience.
Posted: 22 Jul 2015 | Published: 07 Jan 2015

HID

Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER: This white paper focuses on the importance of using a strong authentication method to protect your company from hackers and detrimental threats. Read on to learn of the benefits of a strong authentication solution, such as fraud detection and behavioral benefits, as well as the simplicity behind deploying and managing your security.
Posted: 22 Jul 2015 | Published: 20 Mar 2014

HID

Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation

The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: Access this white paper to learn the five common factors challenging IP-based identification and how device fingerprinting can make it easier.
Posted: 10 Jul 2015 | Published: 29 May 2015

Radware
1 - 25 of 394 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement