IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 
Definition continues below.
Access RightsReports
101 - 125 of 140 Matches Previous Page  | Next Page
E-Guide: Achieving compliance through IAM
sponsored by SearchSecurity.com
EGUIDE: Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

SearchSecurity.com

Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER: BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Key Differences Between Remote Desktop Access vs. Mobile Access
sponsored by LogMeIn, Inc.
EGUIDE: In this essential e-guide, expert Brian Madden discusses some of the key differences between remote desktop access and mobile access. Find out how these solutions use different technologies for various use cases, and discover tools that enable the right remote desktop accessibility to fit your user’s needs.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

LogMeIn, Inc.

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER: Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Viewfinity

On Lockdown: HMV/Waterstone’s asserts control over user activity
sponsored by Safestone Technologies
CASE STUDY: Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Safestone Technologies

The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 31 Aug 2011 | Published: 30 Aug 2011

Dell Software

SearchSecurity.com E-Guide: The critical role of privileged account management in data security
sponsored by IBM
EGUIDE: Privileged accounts are extremely difficult to secure and now represent the biggest threat to today’s enterprises. This expert tip discusses the technology and strategies available to help organizations take better control over privileged accounts.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

3 undeniable use cases for automated IAM controls
sponsored by IBM
WHITE PAPER: This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity.
Posted: 01 Jul 2011 | Published: 03 Jan 2011

IBM

Wave Methodology- A Practical Guide to Defining Roles for Access Control
sponsored by Oracle Corporation
WHITE PAPER: As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control.
Posted: 13 Jun 2011 | Published: 10 Jun 2011

Oracle Corporation

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
sponsored by Intel
WHITE PAPER: Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Posted: 10 May 2011 | Published: 10 May 2011

Intel

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Five Signs Your File Data is at Risk
sponsored by Imperva
WHITE PAPER: Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

E-Book: Technical Guide on Managing Identities and Access Control
sponsored by CA Technologies
EBOOK: SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
Posted: 23 Dec 2010 | Published: 23 Dec 2010

CA Technologies

The Case for Risk-Based, Business-Aligned Internal Audit
sponsored by RSA
WHITE PAPER: The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

RSA

Presentation Transcript: Effective and Secure User Account Provisioning
sponsored by Hitachi ID Systems, Inc.
PRESENTATION TRANSCRIPT: Effective provisioning means not only working with an identity and access management provider and its product, but it is also about business process, effective communication and phased implementation.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Hitachi ID Systems, Inc.

Understanding and Simplifying Sharepoint 2007 Permissions Management
sponsored by Idera
WHITE PAPER: Authentication to a SharePoint environment is the process in which a company’s IT architecture approves a user’s credentials. To fully understand the spectrum involved with managing permissions in a SharePoint environment, you need to know the components involved with permissions and how they work with one another.
Posted: 27 Jul 2010 | Published: 27 Jul 2010

Idera

E-Book: Best Practices - How to implement and maintain enterprise user roles
sponsored by CA Technologies
EBOOK: Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

CA Technologies

Managing Identities and Access Control
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
Posted: 24 Feb 2010 | Published: 24 Feb 2010

SearchSecurity.com

PGP Whole Disk Encryption Workgroup Edition - The full-disk encryption solution for small companies and workgroups
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption Workgroup Edition is a comprehensive full-disk protection solution that provides industry-leading encryption for desktops, laptops, and USB devices with simple administration. With PGP Whole Disk Encryption Workgroup Edition, there are no servers or databases to configure and manage.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Role Based Access Control and Entitlement Management
sponsored by FoxT
PRESENTATION TRANSCRIPT: The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC.
Posted: 30 Sep 2009 | Published: 30 Sep 2009

FoxT

Preventing Data Breaches in Privileged Accounts Using Access Control
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper explores insider attacks, threats and risks involved across every enterprise. Also, we will recommend a sound, cost-saving solution to prevent a disaster from happening to a company's financial assets and reputation using access control.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

BeyondTrust Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions.
Posted: 19 Aug 2009 | Published: 03 Aug 2009

Imperva

Database Crime Scene Prevention
sponsored by Imperva
TECHNICAL ARTICLE: This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
Posted: 19 Aug 2009 | Published: 20 Feb 2009

Imperva
101 - 125 of 140 Matches Previous Page    3 4 5 6    Next Page
 
ACCESS RIGHTS DEFINITION (continued): … In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System software then automatically enforces these privileges.
Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement