IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 
Definition continues below.
Access Rights Reports
1 - 25 of 134 Matches Previous Page  |  Next Page
Enable Collaboration without Compromising Content
sponsored by IntraLinks, Inc
CASE STUDY: Chances are that you need to do work with outside parties, but you're concerned that doing so puts your content at risk. Find out what Young New Yorkers, a non-profit organization, did to ensure that they could maintain their collaborative efforts without compromising content security.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

IntraLinks, Inc

Trusted Identities in Digital Business The Benefits of PKI
sponsored by Entrust, Inc.
ANALYST BRIEF: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your teams time, effort, and resources.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Keeping the Keys to Your Cloud Future Secure
sponsored by Entrust, Inc.
RESOURCE: Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Essential Security & Enablement for Your Enterprise
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Your Guide for Identity Governance and Administration
sponsored by IBM
ANALYST REPORT: With the identity governance and administration (IGA) market maturing, many enterprises are beginning their search for an IAM vendor or reevaluating their current partnerships. This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.
Posted: 29 Aug 2016 | Published: 29 Feb 2016

IBM

For Better Access Governance, Look Beyond Roles to
sponsored by IBM
WHITE PAPER: Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Five New Rules for Enterprise File Sync and Share Service Providers
sponsored by Citrix
RESOURCE: New rules for EFSS providers have been put in place that provide security benefits to customer data while restricting access of files to EFSS providers. Access this resource to learn these 5 new rules, and how your EFSS provider should be reacting.
Posted: 16 May 2016 | Published: 18 Nov 2014

Citrix

Top Identity Governance and Administration Vendors Examined
sponsored by IBM
WHITE PAPER: In this Gartner Magic Quadrant, you will explore the strengths of the leading IGA platforms and vendors. Access now to discover how to evaluate your needs and find which system best fits into your IAM and IGA strategy.
Posted: 11 Mar 2016 | Published: 12 Jan 2015

IBM

Making Sure Your Identity and Access Management Program is Doing What You Need
sponsored by SearchSecurity.com
EGUIDE: Identity and access management (IAM) can cause a multitude of issues within an organization if not managed properly. This expert guide explores how to ensure your identity and access management services enable and support the established CIO priorities.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

SearchSecurity.com

Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

CW buyer’s guide: managing identity & access
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

SearchSecurity.com

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by SearchSecurity.com
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Posted: 04 Nov 2013 | Published: 31 Oct 2012

IBM

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Webroot

Handbook: Identity and Access Management
sponsored by SearchSecurity.com
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com
1 - 25 of 134 Matches Previous Page    1 2 3 4    Next Page
 
ACCESS RIGHTS DEFINITION (continued): … In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System software then automatically enforces these privileges.
Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement