IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 557 Matches Previous Page  |  Next Page
Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

4 Steps to Cloud Access Management
sponsored by Gemalto
WHITE PAPER: While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe a profitable.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Gemalto

Protecting the Keys to Your Kingdom
sponsored by Thycotic
WHITE PAPER: In this white paper, take an in-depth dive into privileged account management in order to ensure that employees only have the permissions they need for the job – not ones that make you vulnerable.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Thycotic

80/20: The New and Not-So New World of OT and IoT Security
sponsored by Atos
WHITE PAPER: This white paper explores the new environments of operational technology (OT) and the Internet of Things (IoT), acknowledging the risks within, with proven security tools and practices. Learn how to use the new 80/20 rule to navigate and simplify OT and IoT into manageable segments.
Posted: 02 Aug 2017 | Published: 26 Jul 2017

Atos

How LepideAuditor Helps You Detect and Prevent Insider Threats
sponsored by Lepide Software
EBOOK: Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

How UTHealth Medical Center Handles Data
sponsored by Virtual Instruments
WEBCAST: As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.
Posted: 19 Jul 2017 | Premiered: Jun 15, 2017

Virtual Instruments

Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

5 Myths about Privileged Access Security for AWS
sponsored by Centrify Corporation
EBOOK: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication
sponsored by Centrify Corporation
PRODUCT DEMO: Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Vendor Assessment: Access Management, Worldwide
sponsored by Centrify Corporation
ANALYST REPORT: The access management market has evolved beyond supporting traditional web applications to support mobile applications and APIs – now there are more choices than ever when it comes to vendors that offer IDaaS. Download this Report to take a look at a vendor comparison that outlines the strengths and weaknesses of vendors in the space.
Posted: 28 Jun 2017 | Published: 07 Jun 2017

Centrify Corporation

The Internet of Relevant Things
sponsored by Aruba Networks
WHITE PAPER: The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 17 May 2017 | Published: 18 Jan 2017

Aruba Networks

Top 5 Reasons Public Sector Looks to the Cloud
sponsored by Accenture
WHITE PAPER: As businesses continue to deal with digital transformation, public sector organizations have more requirements to deal with than those in the private sector. Discover the 5 key areas that make cloud the best option for public sector digital transformations.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Accenture

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016

HID

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

State of PAM 2016
sponsored by Thycotic
ANALYST REPORT: In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Thycotic

6 Pillars of Big Data: How to Harness Data with Tableau
sponsored by Tableau Software
WHITE PAPER: Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of a big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Tableau Software

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Put Your Business Content to Work
sponsored by IBM
MICROSITE: In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.
Posted: 28 Jul 2016 | Published: 28 Jul 2016

IBM

IBM MaaS360 Mobile Application Management
sponsored by IBM MaaS360
RESOURCE: Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.
Posted: 21 Jun 2016 | Published: 29 Jan 2016

IBM MaaS360

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security
1 - 25 of 557 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement