IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 
Definition continues below.
Authorization Reports
1 - 25 of 240 Matches Previous Page  |  Next Page
Office 365 single sign-on augurs complexity, setup hitches
sponsored by Symantec Corporation
EGUIDE: Could Office 365 be the perfect scenario for SSO or riddled with issues down the line? Get more insight on the impact to mobile device management and BYOD inside.
Posted: 20 May 2016 | Published: 12 May 2016

Symantec Corporation

Builders vs. Breakers: 10 Preventable Online Attacks
sponsored by Pluralsight
VIDEO: Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.
Posted: 20 May 2016 | Premiered: 05 May 2014

Pluralsight

What Are the Best Ways to Improve SMB Security?
sponsored by CDW
EGUIDE: Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.
Posted: 19 May 2016 | Published: 18 May 2016

CDW

Unified Identity Governance - A Business Overview
sponsored by Oracle Corporation
WHITE PAPER: Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.
Posted: 19 May 2016 | Published: 31 May 2015

Oracle Corporation

Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics
sponsored by Barracuda Networks
RESOURCE: Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Securing Office 365 with Symantec
sponsored by Symantec Corporation
PRODUCT OVERVIEW: How can you embrace the benefits of cloud-based email without compromising security or adding risk? Learn how to fill in the security gaps found in Office 365 with a comprehensive security solution that seamlessly integrates with and enhances its built-in security.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Modernizing Active Directory for Azure and Office 365
sponsored by Dell Software
WHITE PAPER: This white paper highlights best practices for modernizing and integrating your in-premises AD into Azure so that you can enjoy less administration of on-premises hardware and software and introduce your organization to identity as a service.
Posted: 10 May 2016 | Published: 31 Dec 2015

Dell Software

Understand Pass-the-Hash (PtH) Attacks and Mitigate the Risk
sponsored by Dell Software
WHITE PAPER: Go in depth and learn what a hash is and how a PtH attack can greatly impact your network. Learn how to mitigate these types of attacks with Privileged Password Manager and Privileged Session Manager.
Posted: 09 May 2016 | Published: 31 Dec 2014

Dell Software

Identity and Access Management for the Real World: The Fundamentals
sponsored by Dell Software
EBOOK: This e-book discusses the most pressing IAM issues faced by most organizations and offers actionable and sustainable approaches to the IAM challenges you encounter. Access now to learn what IAM for the real world can and should look like.
Posted: 09 May 2016 | Published: 31 Dec 2014

Dell Software

How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

How HIPAA Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: Achieving compliance with data security standards requires you to mitigate the risk of privileged access – in healthcare and other industries. Access this white paper now to learn how you can implement proven strategies to achieve regulatory compliance while fighting against other risks.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Barracuda NG Firewall Model F1000
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Get Ahead of Your Next Security Breach
sponsored by Dell Software
WHITE PAPER: An outline of the five steps you can take to protect your organization from the inherent risks of privileged accounts.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Strategies for Successfully Managing Privileged Accounts
sponsored by Dell Software
WHITE PAPER: The problem with many PAM programs is that they address only one or two of the underlying issues, leaving your organization insecure. Is your privileged identify management program on the right path? Sanity check inside.
Posted: 05 May 2016 | Published: 31 Dec 2015

Dell Software

Securing Real-Time Mobile Communications
sponsored by Mitel Networks Limited
WHITE PAPER: This white paper offers contemporary real-time communications services that are secured end-to-end. Allow employees to communicate remotely through any device using strict identity management tools that ensure your information won't be sent to anyone without proper authorization.
Posted: 04 May 2016 | Published: 01 Apr 2016

Mitel Networks Limited

The Total Economic Impact Of Forcepoint's SureView Insider Threat
sponsored by Forcepoint
WHITE PAPER: This Forrester report shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications. View not and learn how you can gain visibility that other network devices cannot.
Posted: 02 May 2016 | Published: 01 Oct 2014

Forcepoint

Key steps to securing data and maintaining proper access
sponsored by IBM
WHITE PAPER: This white paper helps you get a better grip on who's accessing your network. With the right identity governance and administration system, you can control access risks and segregation-of-duties violations. Access now to easily apply and enforce appropriate levels of access across your enterprise.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

IBM

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that you need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

Turn iOS, Android or BlackBerry Devices into Security Tokens
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.
Posted: 18 Apr 2016 | Published: 02 Mar 2016

BlackBerry

IoT Security: Have You Addressed These 10 Critical Issues?
sponsored by Axway
WHITE PAPER: Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

Axway

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

A Buyer's Guide to Identity Integration Solutions
sponsored by Radiant Logic, Inc.
WHITE PAPER: A federated identity service could be the answer to today's increasingly large and increasingly complex environments, and this white paper describes how.
Posted: 05 Apr 2016 | Published: 31 Dec 2014

Radiant Logic, Inc.

Common Identity for WAM and Federation
sponsored by Radiant Logic, Inc.
WHITE PAPER: Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.
Posted: 04 Apr 2016 | Published: 31 Dec 2015

Radiant Logic, Inc.
1 - 25 of 240 Matches Previous Page    1 2 3 4    Next Page
 
AUTHORIZATION DEFINITION (continued): … Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating system or application, the system or application may want to identify what resources the user can be given during this session. Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system adminstrator and the actual checking of the permission values that have been set up when a user is getting access.Logically, authorization is preceded by authentication.
Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement