IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control White Papers (View All Report Types)
26 - 50 of 371 Matches Previous Page  |  Next Page
Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

The Essential Guide to Privileged Access Management
sponsored by FoxT
WHITE PAPER: In this white paper, you will discover how to effectively and efficiently control privileged UNIX and Linux accounts using centralized access management. Read on to secure privileged access across your corporation with granular authorization, and more.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

Deliver Secure, New Business Services and Improve the Customer Experience
sponsored by CA Technologies
WHITE PAPER: This resource discusses ways organizations can deliver secure, new business services with identity management in mind. By accessing, you'll find a checklist designed to help you simultaneously grow and protect your business.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

CA Technologies

Case Study: Ad Agency Makes Office 365 Secure
sponsored by BitGlass
WHITE PAPER: This case study discusses how a global ad agency found a solution to its Office 365 security concerns. Take a look to see what security measures this organization implemented and how you can do the same.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

Specification IAM Server Control
sponsored by FoxT
WHITE PAPER: This white paper teaches you how to enable holistic identity management, strong authentication, granular control, and SSO for users while mitigating unwanted access.
Posted: 17 Dec 2015 | Published: 02 Dec 2015

FoxT

Advanced Session Security
sponsored by CA Technologies
WHITE PAPER: Surveys show that IT security experts have identified session hijacking as one of the top three security risks. Access this white paper and uncover details on two highly successful methods for enhancing session security.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

CA Technologies

New Recommendations From FFIEC on Extortion Attacks
sponsored by Easy Solutions
WHITE PAPER: Recently, the Federal Financial Institutions Examinations Council (FFIEC) issued a statement warning financial institutions of the cyber-risks they face and suggesting steps for avoiding those risks. Access this article for a summary of the most important information and guidelines to come out of the FFIEC statement.
Posted: 15 Dec 2015 | Published: 17 Nov 2015

Easy Solutions

The Mobile Cloud: How Cloud Services Cast Dark Shadows on Mobile Activity
sponsored by IBM
WHITE PAPER: This article explains how cloud app security brokers solutions (CASBs) are giving CISOs visibility into employee usage of cloud apps in the enterprise. Read on to learn the benefits of integrating this technology with enterprise mobility management (EMM) tools.
Posted: 01 Dec 2015 | Published: 04 Nov 2015

IBM

A Guide to Selecting the Best Authentication and Access Control for Your Enterprise
sponsored by SecureAuth
WHITE PAPER: Discover the 4 critical categories to consider when choosing an advanced authentication and access control strategy.
Posted: 13 Nov 2015 | Published: 28 Oct 2015

SecureAuth

The Continuum of Self-Service
sponsored by LogiAnalytics
WHITE PAPER: Access this white paper to find five essentials you should consider before empowering users with self-service analytics.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

LogiAnalytics

Are You Ready for a New Era of Risk?
sponsored by Global Knowledge
WHITE PAPER: In this age of sophisticated threats, security awareness and training is essential for everyone within an organization. Access this white paper to learn how Cisco has continued to evolve its security solutions and training.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Global Knowledge

Case Study: File-Sharing Security that Doesn't Sacrifice Efficiency
sponsored by FinalCode
WHITE PAPER: Access this case study to discover how one business found a secure file-sharing solution that didn't hinder worker efficiency.
Posted: 05 Oct 2015 | Published: 30 Apr 2015

FinalCode

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Red Hat Jboss Data Grid Supercharges Modern Applications
sponsored by Red Hat
WHITE PAPER: Read this white paper to learn how to supercharge your modern applications and meet both immediate and long term IT goals.
Posted: 30 Jul 2015 | Published: 30 Jun 2015

Red Hat

Defending Against Advanced Threats at the Identity Perimeter
sponsored by SecureAuth
WHITE PAPER: This white paper explores how identity has become the new perimeter and the challenges that lie ahead.
Posted: 17 Jun 2015 | Published: 27 May 2015

SecureAuth

Utilizing Customer IAM to Better Enable and Protect Your Organization
sponsored by CA Technologies.
WHITE PAPER: This white paper explores customer identity and access management (CIAM) and how to enable and secure multiple channels of customer interaction.
Posted: 15 Jun 2015 | Published: 16 Jul 2014

CA Technologies.

Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

5 Insider Tips for VPN Attack Protection
sponsored by SecureAuth
WHITE PAPER: This expert white paper examines the five tips to mitigating VPN breaches and protecting your data.  Read on to learn more.
Posted: 30 Mar 2015 | Published: 04 Mar 2015

SecureAuth

Top Identity Governance and Administration Vendors Examined
sponsored by IBM
WHITE PAPER: In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.
Posted: 24 Mar 2015 | Published: 12 Jan 2015

IBM

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM
26 - 50 of 371 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement