IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 
Definition continues below.
Authorization Reports
26 - 50 of 244 Matches Previous Page  |  Next Page
Common Identity for WAM and Federation
sponsored by Radiant Logic, Inc.
WHITE PAPER: Can your organization effectively manage sprawling identities? In this white paper, uncover the secret to leveraging your federation IdP.
Posted: 04 Apr 2016 | Published: 31 Dec 2015

Radiant Logic, Inc.

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.
Posted: 01 Apr 2016 | Published: 31 Dec 2013

Radiant Logic, Inc.

The Key to Secure and Seamless Access to Web and Cloud Applications
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 01 Apr 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

Revitalize and Extend the Reach of Your Current ISAM Portal
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper teaches you how to extend authentication across web apps and leverage existing identity stores for faster, fine-grained authorization.
Posted: 31 Mar 2016 | Published: 02 Mar 2016

Radiant Logic, Inc.

How to Federate Access and Identity Together for a Complete IdP
sponsored by Radiant Logic, Inc.
WEBCAST: Learn how federating the identity sources behind your IdP takes you the last mile for smarter and richer attribute-based policies.
Posted: 31 Mar 2016 | Premiered: Feb 12, 2016

Radiant Logic, Inc.

Protect Your Computer Screen With OptioLabs' OptioAware
sponsored by OptioLabs
VIDEO: In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.
Posted: 30 Mar 2016 | Premiered: 15 Dec 2015

OptioLabs

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Security for the Internet of Things: Upcoming Trends to Watch
sponsored by Microsoft
RESOURCE: By 2020, over 25% of identified attacks in enterprises will involve the Internet of Things (IoT). In this resource, Gartner's IoT security analysts offer predictions for upcoming market trends and recommendations about which security services are worth the investment.
Posted: 23 Mar 2016 | Published: 09 Dec 2015

Microsoft

Why Healthcare SSO is a Must-Have
sponsored by Aventura
EGUIDE: As healthcare organizations adopt more cloud services, IT needs to mitigate poor password practices in their user base to avoid costly data breaches. This expert e-guide reviews why single sign-on (SSO) platforms have risen in popularity in healthcare organizations and presents the benefits of implementing SSO for your user base.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Aventura

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

Continuous Monitoring and Threat Mitigation with Next-Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, discover how to transform your disparate security technology silos into a more unified and automated system that continuously monitors and mitigates threats with next-generation NAC. Read on to learn how to enable BYOD adoption and support IT-GRC framework specifications.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ForeScout Technologies, Inc.

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
PRODUCT OVERVIEW: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace allowing users to have the freedom to connect to any network and IT is struggling to maintain control. Discover how to maintain policy control, workflow automation and enhance visibility for a seamless mobile experience.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Aruba Networks

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: With the current shift toward mobility becoming the business norm, security needs to be your top priority. Discover how to protect BYOD workflows and deliver secure enterprise-class mobility by utilizing a user and device authentication software. Read on to learn about mobile security best practices.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

Stop Data Breaches with Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Examine how privileged access management can help stop data breaches. Learn now about a 3-step process for blocking attackers' attempts to carry out crimes in your organization.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

SaaS Safety and Security: Taming the Office Password Monster
sponsored by Dashlane Inc.
WHITE PAPER: Learn if you're leaving the door open for hackers in this white paper as it shines a light on the many password management blunders. Discover how to keep login simple for your users without creating undue risk.
Posted: 24 Dec 2015 | Published: 23 Dec 2015

Dashlane Inc.

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Higher Education: How to Comply with Network Security Legislation
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a way for higher education institutions to comply with IT security regulations and protect students and staff from harmful content by consolidating multiple security services into a single, high performance device that cuts equipment, administration, and management costs.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.
26 - 50 of 244 Matches Previous Page    1 2 3 4 5    Next Page
 
AUTHORIZATION DEFINITION (continued): … Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating system or application, the system or application may want to identify what resources the user can be given during this session. Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system adminstrator and the actual checking of the permission values that have been set up when a user is getting access.Logically, authorization is preceded by authentication.
Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement