IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 557 Matches Previous Page  |  Next Page
Identity of Things: The Role of Identity Management in the IoT
sponsored by Amido
WHITE PAPER: Identity and Access Management (IAM) has become a core platform. According to IDG, 91% of IT Managers seeing identity management as a key enabler for their digital business initiatives. Learn why IAM is evolving with the Internet of Things (IoT), and how to ensure your digital business is built on a firm foundation of identity.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Amido

Overview of AWS Security: Database Services
sponsored by Amazon Web Services
WHITE PAPER: While the cloud has improved security overall, AWS, aware that it is a large target for cyberattackers hunting for data, has stepped up to the challenge. This white paper gives you an overview of the database security services that AWS provides.
Posted: 09 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Security at Scale: Governance in AWS
sponsored by Amazon Web Services
WHITE PAPER: Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.
Posted: 09 Oct 2017 | Published: 30 Oct 2015

Amazon Web Services

A Solution for Managing Privileged Access
sponsored by Devolutions
WHITE PAPER: For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Devolutions

What is Cloud Access Management and Who Needs It?
sponsored by Gemalto
WHITE PAPER: Inside, learn how a cloud access management program can ensure the right people have access to the right applications at the correct level of trust. Then discover the 4 benefits you can reap from having such a program in place.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Gemalto

Aruba Campus Switching: The Foundation for the Modern Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Improve End-to-end Security with Aruba Clearpass
sponsored by Aruba Networks
RESOURCE: In this resource, learn how to protect all devices corporate, IoT, BYOD- wired and wirelessly to tighten up end-to-end security from unauthorized users.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Privilege Management Overview: Strengths and Challenges
sponsored by One Identity
ANALYST REPORT: In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

One Identity

Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

4 Steps to Cloud Access Management
sponsored by Gemalto
WHITE PAPER: While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe and profitable.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Gemalto

80/20: The New and Not-So New World of OT and IoT Security
sponsored by Atos
WHITE PAPER: This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.
Posted: 02 Aug 2017 | Published: 26 Jul 2017

Atos

How LepideAuditor Helps You Detect and Prevent Insider Threats
sponsored by Lepide Software
EBOOK: Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

How UTHealth Medical Center Handles Data
sponsored by Virtual Instruments
WEBCAST: As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.
Posted: 19 Jul 2017 | Premiered: Jun 15, 2017

Virtual Instruments

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID Global
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016

HID Global

State of PAM 2016
sponsored by Thycotic
ANALYST REPORT: In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Thycotic

6 Pillars of Big Data: How to Harness Data with Tableau
sponsored by Tableau Software
WHITE PAPER: Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of a big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Tableau Software

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Put Your Business Content to Work
sponsored by IBM
MICROSITE: In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.
Posted: 28 Jul 2016 | Published: 28 Jul 2016

IBM

IBM MaaS360 Mobile Application Management
sponsored by IBM MaaS360
RESOURCE: Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.
Posted: 21 Jun 2016 | Published: 29 Jan 2016

IBM MaaS360

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security
1 - 25 of 557 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement