IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access ControlReports
1 - 25 of 645 Matches Previous Page  | Next Page
Identity and Access Governance Buyer's Guide
sponsored by Courion Corporation
WHITE PAPER: This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Courion Corporation

When Worlds Collide: Cloud Apps and Financial Services
sponsored by BitGlass
WHITE PAPER: Read this white paper to learn how to tackle the two major hurdles that businesses must clear when moving financial data to public cloud applications: Security and compliance regulations.
Posted: 14 Nov 2014 | Published: 14 Nov 2014


Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

How to Protect Critical Data while Maintaining Ease of Use
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper explores how you can strike a balance between security and convenience.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Tackle Inside Threats with Privileged Access Management
sponsored by Gemalto
WHITE PAPER: Download this exclusive whitepaper now to uncover how to manage privileged access and determine who should have what type of access. Also find stats about insider security breaches and more.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

How to Manage Privileged Access in the Enterprise
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper covers five key tips for managing privileged access in the enterprise.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Imaging and Printing: Is Your Valuable Data Protected?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Exercising Control Over Mobile Access
sponsored by Aruba Networks
EGUIDE: In this expert e-guide, explore several tips for managing mobile authentication methods and learn how to control what mobile devices can and cannot do inside your network.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

Aruba Networks

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Tame Mobile and Cloud Security Risks by Becoming an IdP
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Office 365: Strong Authentication and SSO in the Cloud
sponsored by SecureAuth
WHITE PAPER: In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Best Practices for Deploying Cloud
sponsored by Scalr
EGUIDE: This expert e-guide reveals why cloud industry expert David Linthicum believes clouds are more secure than traditional IT systems, as well as hybrid clouds taking over in the future.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Scalr

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID
1 - 25 of 645 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement