IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
26 - 50 of 640 Matches Previous Page  |  Next Page
Blue Skies Ahead? The State of Cloud Adoption
sponsored by Intel Security
WHITE PAPER: IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

How a German Utilities Company Embraced Secure Profile Management
sponsored by VMware
RESOURCE: This infographic shows how one German company overcame its cumbersome profile management practices, enhancing end-user experience and security in the process.
Posted: 06 May 2016 | Published: 31 Dec 2015

VMware

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

IBM

Designing Single Sign-On Architecture for Enhanced Security
sponsored by CA Technologies
WHITE PAPER: Single sign-on (SSO) and session management, across a wide variety of sites using host-only cookies, can make theft much more difficult for cybercriminals. Discover ways to deliver broader, cross-application SSO for end-users using a central cookie provider.
Posted: 12 Apr 2016 | Published: 27 Feb 2015

CA Technologies

The Key to Protecting Your Business Amid Cybercrime’s Current Boom
sponsored by CA Technologies
WHITE PAPER: This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

CA Technologies

IoT Security: Have You Addressed These 10 Critical Issues?
sponsored by Axway
WHITE PAPER: Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

Axway

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Effectively managing privileged access across your hybrid enteprise is an imperative to reducing security and compliance risks. Discover ways to prevent unauthorized access and minimize the impact of breaches while simplifying compliance.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Secure Data in the Cloud with AWS Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.
Posted: 07 Apr 2016 | Published: 24 Mar 2016

Radiant Logic, Inc.

A Buyer's Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 05 Apr 2016 | Published: 31 Dec 2014

Radiant Logic, Inc.

Common Identity for WAM and Federation
sponsored by Radiant Logic, Inc.
WHITE PAPER: Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.
Posted: 04 Apr 2016 | Published: 31 Dec 2015

Radiant Logic, Inc.

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.
Posted: 01 Apr 2016 | Published: 31 Dec 2013

Radiant Logic, Inc.

The Key to Secure and Seamless Access to Web and Cloud Applications
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 01 Apr 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

Revitalize and Extend the Reach of Your Current ISAM Portal
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper teaches you how to extend authentication across web apps and leverage existing identity stores for faster, fine-grained authorization.
Posted: 31 Mar 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

How to Federate Access and Identity Together for a Complete IdP
sponsored by Radiant Logic, Inc.
WEBCAST: Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.
Posted: 31 Mar 2016 | Premiered: Feb 12, 2016

Radiant Logic, Inc.

Simplify Cloud Access and Provisioning with a Federated Identity Service
sponsored by Radiant Logic, Inc.
WEBCAST: What happens when there are users outside of AD-LDAP directories? This webinar examines why simply federating access in your organization isn't enough and how to federate your identity layer.
Posted: 30 Mar 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

HDAP: the Big Data LDAP Directory Storage
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.
Posted: 28 Mar 2016 | Premiered: Mar 15, 2016

Radiant Logic, Inc.

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Why Healthcare SSO is a Must-Have
sponsored by Aventura
EGUIDE: As healthcare organizations adopt more cloud services, IT needs to mitigate poor password practices in their user base to avoid costly data breaches. This expert e-guide reviews why single sign-on (SSO) platforms have risen in popularity in healthcare organizations and presents the benefits of implementing SSO for your user base.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Aventura

The Business Case for Hybrid Networks
sponsored by MASERGY
WHITE PAPER: The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.
Posted: 21 Mar 2016 | Published: 07 Mar 2016

MASERGY

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.
26 - 50 of 640 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement