IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access ControlWhite Papers (View All Report Types)
51 - 75 of 362 Matches Previous Page  | Next Page
Enterprise Integration with Public Cloud Services using OAuth
sponsored by Forum Systems
WHITE PAPER: This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

Multifactor Authentication: Removing Risk While Simplifying Processes
sponsored by NetIQ
WHITE PAPER: In this resource, learn how multi-factor authentication brings that extra line of defense your organization needs to protect against malicious hackers.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

World Wide Technology Accelerates and Streamlines Access Management
sponsored by NetIQ
WHITE PAPER: This case study shares one organization's experience with an access management solution that enabled 8x faster integration with new services so that users could count on reliable, secure access to business applications anytime, anywhere.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Advanced Persistent Threats: Insider Credentials at Risk
sponsored by NetIQ
WHITE PAPER: This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

NetIQ

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

IBM

Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Cisco Systems, Inc and Citrix

Mobile Connect
sponsored by Dell Software
WHITE PAPER: Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

When Millions Need Access: Identity Management in an Interconnected World
sponsored by IBM
WHITE PAPER: This whitepaper covers an automation solution that will allow you to monitor the ever-growing number of access points to your organization's sensitive data.
Posted: 06 Mar 2014 | Published: 13 Feb 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications.
Posted: 05 Mar 2014 | Published: 31 Dec 2011

IBM

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure.
Posted: 24 Feb 2014 | Published: 30 Sep 2013

IBM

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Managing Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data.
Posted: 18 Feb 2014 | Published: 31 Dec 2011

IBM

What Recovery-Centric Licensing Means for You
sponsored by Asigra
WHITE PAPER: Download this report to learn how recovery-centric licensing can benefit your organization.
Posted: 14 Feb 2014 | Published: 31 Jul 2013

Asigra

Making Smarter Mobile Access Decisions
sponsored by Dell Software
WHITE PAPER: Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Dell Software

5 Oauth Essentials for API Access Control
sponsored by CA Technologies.
WHITE PAPER: View this resource to uncover an application programming interface (API) authentication solution fit for the enterprise. Read on for 5 things to consider before deployment.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

CA Technologies.

Federated Identity & Single Sign‐On Using Layer 7
sponsored by CA Technologies.
WHITE PAPER: In this white paper, learn how separate identity silos create gaps and complexities in security measures. Read on to reveal a solution that federates identity and provides single sign-on (SSO) services for mobile and virtual applications to reduce these challenges.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

A How‐to Guide to OAuth & API Security
sponsored by CA Technologies.
WHITE PAPER: When it comes to Web applications, one of the top concerns is security. With OAuth, users can authorize limited access to applications and data. View this white paper for a how-to guide to OAuth and API security.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM

Securing Access to the Office 365 Cloud with HOTPin Two-Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: This guide explores some basic planning and deployment steps for Microsoft Office 365 and some key considerations on how to keep the system secure.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks
51 - 75 of 362 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement