IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control White Papers (View All Report Types)
26 - 50 of 409 Matches Previous Page  |  Next Page
The Evolution of Consumer Identity: 5 Biggest Trends
sponsored by Gigya
WHITE PAPER: This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.
Posted: 18 Mar 2016 | Published: 31 Dec 2015

Gigya

Securing Embedded Passwords with Privileged Access Management
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper outlines why it's important to secure embedded passwords to protect your data and users. Read on to learn the 13 steps to securing privileged accounts and passwords to boost your security.
Posted: 17 Mar 2016 | Published: 20 Feb 2014

Hitachi ID Systems, Inc.

Selecting a Privileged Identity Management Solution
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: There are a number of privileged identity management (PIM) solutions on the market today, but sifting through vendor hype quickly becomes laborious. This white paper provides and in-depth view of the leading PIM strategies and compares each to help you choose which approach is best for your organization.
Posted: 16 Mar 2016 | Published: 02 Mar 2016

Hitachi ID Systems, Inc.

Privileged Access Management Security Survey Results
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper provides you with the path to successful privileged access management (PAM) and securing your organization from identity fraud.
Posted: 16 Mar 2016 | Published: 27 Jan 2016

Hitachi ID Systems, Inc.

Why Identity is at the Heart of the IoT
sponsored by Gigya
WHITE PAPER: This resource describes how a well-designed customer identity and access management (cIAM) strategy can unlock the true capabilities of the IoT. Discover use cases that demonstrate how cIAM can offer secure, personalized user experiences with connected products.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Gigya

Integrating Password Management with Enterprise Single Sign-On
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: In this document, you will compare password synchronization and reset tech to enterprise SSO, and examine how each addresses the pressing business problem of securing authentication. Discover how to integrate these dueling technologies, and identify several interoperability challenges.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Hitachi ID Systems, Inc.

Building Secure Multifactor Authentication
sponsored by Okta
WHITE PAPER: As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for web and mobile applications. In this white paper, you'll explore the pros and cons of the several MFA strategies available.
Posted: 14 Mar 2016 | Published: 09 Mar 2016

Okta

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

Top Identity Governance and Administration Vendors Examined
sponsored by IBM
WHITE PAPER: In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.
Posted: 11 Mar 2016 | Published: 12 Jan 2015

IBM

Best Practices for Securing Privileged Access
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This extensive white paper describes the business problems which privileged access management system (PAMS)s are intended to address.
Posted: 11 Mar 2016 | Published: 26 Jun 2015

Hitachi ID Systems, Inc.

Adaptive MFA: Moving Beyond User Name and Password
sponsored by Okta
WHITE PAPER: Is multifactor authentication (MFA) the key to protecting users? In this white paper, uncover the facts about MFA and how to secure accounts from unauthorized access, even if a password is compromised.
Posted: 10 Mar 2016 | Published: 17 Feb 2016

Okta

CISO's Guide to Secure Cloud and Mobile Data
sponsored by Okta
WHITE PAPER: Are you prepared to mitigate phishing and man-in-the-middle attacks on the multitude of user devices in your organization? Find out how to boost your security strategy to keep up with today's attacks in this helpful white paper.
Posted: 10 Mar 2016 | Published: 08 Mar 2016

Okta

Reframe The Business Case For Identity And Access Management In Security Terms
sponsored by Okta
WHITE PAPER: In this white paper, learn how to define, measure, and track security metrics to justify the business case for IAM implementation. Read on to learn why you can't secure your enterprise without zero trust identities and how access management centralizes control and lowers costs.
Posted: 09 Mar 2016 | Published: 05 Mar 2015

Okta

CIO Guide: Preventing Data Breaches with MFA
sponsored by Okta
WHITE PAPER: Delve into why security shortcuts around MFA inevitably backfire and open doors for hackers to waltz in thanks to stolen credentials.
Posted: 09 Mar 2016 | Published: 24 Feb 2016

Okta

IAM: The Key to Securing SaaS Apps
sponsored by Okta
WHITE PAPER: This helpful white paper explores why identity and access management (IAM) is the key to securing SaaS apps as organizations continue to march through the cloud adoption era.
Posted: 09 Mar 2016 | Published: 02 Mar 2016

Okta

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

HBR paper: The Danger from Within
sponsored by Imperva
WHITE PAPER: The biggest threat to enterprise security is the people organizations hire and fire. Read this article from the Harvard Business Review, "Danger from Within" to learn why the number of insider cyberattacks is growing and what are 5 ways to tackle the problem.
Posted: 16 Feb 2016 | Published: 24 Sep 2014

Imperva

Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Delivering the NHS Network of the Future
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.
Posted: 19 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.
26 - 50 of 409 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement