IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 
Definition continues below.
Access RightsReports
126 - 140 of 140 Matches Previous Page  |  Next Page
Entitlement Reviews: A Practitioner's Guide
sponsored by Varonis
WHITE PAPER: This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

Fixing the "Everyone" Problem
sponsored by Varonis
WHITE PAPER: Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Varonis

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

eGuide: Essential Guide to Identity & Access Management
sponsored by Information Security Magazine
EGUIDE: This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
Posted: 29 May 2009 | Published: 29 May 2009

Information Security Magazine

Is virtualization a black hole in your security? 5 ways to ensure it isn't
sponsored by Sophos UK
WHITE PAPER: The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end users running unauthorized applications in a virtual environment. This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization and gives five effective ways to secure yourself against them.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Sophos UK

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

10 Things IT Should Be Doing (but isn't)
sponsored by Varonis
WHITE PAPER: Check out this brief paper to learn the ten must-do actions for maximizing unstructured data protection.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Varonis

The Impact of AJAX on the Network
sponsored by F5 Networks
WHITE PAPER: Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies.
Posted: 28 Apr 2008 | Published: 01 Mar 2007

F5 Networks

Enterprise Remote Access
sponsored by F5 Networks
WHITE PAPER: Historically, organizations have used IPSec VPN solutions to provide employees with remote access to network resources; an expensive, complicated deployment for a handful of users. This paper details how this process has modernized.
Posted: 28 Apr 2008 | Published: 01 Sep 2005

F5 Networks

Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER: Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007

BeyondTrust Corporation

Network Access Protection: New Ways to Keep Your Network Healthy
sponsored by Global Knowledge
WHITE PAPER: Learn how Network Access Protection (NAP) operates to isolate non-compliant or infected computers from the network until corrective measures can be taken.
Posted: 06 Jan 2007 | Published: 01 Jan 2007

Global Knowledge

Mainframe Security Entitlement Cleanup
sponsored by CA Technologies.
WHITE PAPER: In this paper, discover an approach that provides easily automated, virtually unattended and continuous cleanup of mainframe security files.
Posted: 26 Oct 2006 | Published: 01 Feb 2006

CA Technologies.

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

Thor Technologies, Inc.: Xellerate®, Secure Enterprise Provisioning System Integrates with RSA ClearTrust® to Provide Enhanced User Management
sponsored by RSA
CASE STUDY: Xellerate®, combined with RSA ClearTrust® software, provides a comprehensive solution that delivers centralized authentication and secure access management as well as user self-service and workflow capabilities.
Posted: 09 Jun 2004 | Published: 07 Jun 2004

RSA
126 - 140 of 140 Matches Previous Page    4 5 6    Next Page
 
ACCESS RIGHTS DEFINITION (continued): … In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System software then automatically enforces these privileges.
Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement