IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 
Definition continues below.
Access Rights Reports
1 - 25 of 133 Matches Previous Page  |  Next Page
Understanding the Role of Stolen Credentials in Data Breaches
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn the 2 steps of a successful credential theft, then learn about a service that fights back against both of these attack paths.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Palo Alto Networks

Privilege Management Overview: Strengths and Challenges
sponsored by One Identity
ANALYST REPORT: In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

One Identity

How to Prevent Privilege Creep and Bolster Access Management
sponsored by CyberArk Software, Inc
EGUIDE: In this e-guide, learn how to keep identity and access management up-to-date to prevent security incidents and data breaches. Plus, hear from industry experts Michael Cobb and Dave Shackleford on best practices to help secure cloud access control and how enterprises can keep user roles and privileges aligned.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

State of PAM 2016
sponsored by Thycotic
ANALYST REPORT: In this report, discover the top privileged account management (PAM) security challenges drawn from the Thycotic Privileged Password Vulnerability Benchmark survey. Learn key statistics and insights, such as: 80% consider PAM a high priority, 52% received a failing grade in providing PAM, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Thycotic

Privileged Password Security Policy Template
sponsored by Thycotic
WHITE PAPER: This white paper offers a security policy template to enable your organization to secure user access accounts from basic profiles to advanced privileges. View now to learn how to comply with governance requirements and enhance IAM security.
Posted: 06 Jan 2016 | Published: 30 Dec 2015

Thycotic

Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID Global
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID Global

Making Sure Your Identity and Access Management Program is Doing What You Need
sponsored by SearchSecurity.com
EGUIDE: Identity and access management (IAM) can cause a multitude of issues within an organization if not managed properly. This expert guide explores how to ensure your identity and access management services enable and support the established CIO priorities.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

SearchSecurity.com

Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

CW buyer’s guide: managing identity & access
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

SearchSecurity.com

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by SearchSecurity.com
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.

Case Study: Protecting Privileged Accounts for a Global Manufacturer
sponsored by Thycotic
CASE STUDY: Identity and access management is one of the easiest and most effective ways that organizations can prevent catastrophic data breaches. In this case study, learn how one manufacturing company restructured their outdated access and password management strategy to meet compliance requirements and mitigate data breaches, theft, and loss.
Posted: 07 Jan 2016 | Published: 23 Dec 2015

Thycotic

Aligning your Enterprise Identity and Access Management Strategy
sponsored by DLT Solutions
EGUIDE: This expert e-guide covers how you can align identity and access management with CIO and business priorities.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

IBM Security Priviledged Identity Management
sponsored by IBM
WHITE PAPER: This quick video discusses an identity management system that can help centralize control of access management and track and audit the activity of privileged users for greater security.
Posted: 21 Feb 2014 | Published: 16 Nov 2012

IBM

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Avoiding Insider Threats to Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper explains how Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Posted: 04 Nov 2013 | Published: 31 Oct 2012

IBM

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Okta

3 Steps to Faster EMR Adoption with Desktop Virtualization
sponsored by Imprivata
WHITE PAPER: Inside, uncover a 3-step process that will not only help you accelerate EMR adoption and achieve Meaningful Use but also provides the benefits of two extremely helpful technologies: desktop virtualization and VDI.
Posted: 04 Sep 2013 | Published: 30 Dec 2011

Imprivata

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Webroot

Handbook: Identity and Access Management
sponsored by SearchSecurity.com
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com
1 - 25 of 133 Matches Previous Page    1 2 3 4    Next Page
 
ACCESS RIGHTS DEFINITION (continued): … In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System software then automatically enforces these privileges.
Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement