IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 
Definition continues below.
Authorization Reports
26 - 50 of 237 Matches Previous Page  |  Next Page
Credential Stuffing a Security Epidemic
sponsored by F5 Networks
WHITE PAPER: 81% of hacking-related breaches include leveraging of usernames and passwords, according to the 2017 Verizon DBIR. This e-book provides insight into credential stuffing attacks as well as a guide to stopping credential theft.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

How Malware Can Steal Your Data
sponsored by F5 Networks
EBOOK: 51% of data breaches include malware, according to Verizon's 2017 Data Breach Investigations Report. This e-book provides insight into how malware can steal your data and offers strategies you use to prevent it from happening.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

A Collaborative Strategy for Your Access Management
sponsored by SailPoint Technologies
WHITE PAPER: Today's rapidly changing business environment demands that businesses be agile, innovative and secure. This white paper examines a collaborative strategy of integrating Microsoft Azure Active Directory with the identity governance capabilities of SailPoint Power of Identity.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

SailPoint Technologies

A Collaborative Integration for IAM
sponsored by SailPoint Technologies
WHITE PAPER: This paper provides a collaboration strategy of integrating Microsoft Azure Active Directory with SailPoint Identity Governance to improve your IAM approach.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Cloud IAM Goes Beyond SSO
sponsored by SailPoint Technologies
WHITE PAPER: With the adoption of cloud IAM on the rise, managing the user's journey, access control, and governance functionality is mandatory. This paper offers 4 challenges that drive cloud IAM adoption and provides invaluable information on cloud access with single-sign-on, access governance and cloud IAM features.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Security and risk management leaders responsible for IAM should be aware of functional differences between on-premises and cloud-delivered identity governance and administration (IGA). This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's IGA products as well as, a market overview.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

SailPoint Technologies

Protect Your Customer and Employee Accounts
sponsored by Digital Shadows
WHITE PAPER: Digital Shadows found that 97% of the largest companies in the world had their credentials exposed. Explore this white paper to learn how to mitigate the growing risks of account takeovers and the measures you can take to ensure your organization is better protected.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Digital Shadows

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

Technology Evolves - Your Backup Should Too
sponsored by Acronis
WHITE PAPER: As technology evolves and become more complex, your security stance should too. Explore this white paper to gain insight into how you can boost your security backup strategy to protect against ransomware, stop data loss, and improve compliance and validity of your recovery.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Acronis

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to the Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Explore this white paper to discover how to protect your organization from data breaches.
Posted: 23 Oct 2017 | Published: 13 Oct 2017

HID Global

New Cybersecurity Regulations Adopted to Protect Financial Systems & Information
sponsored by HID Global
WHITE PAPER: According to a Symantec Internet Security Threat Report, the United States is at the top of the list for both the number of breaches by country and the number of identities stolen by country. Revealed in this white paper is an overview of the New York Cybersecurity Regulation that requires organizations to demonstrate compliance by February 2018.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

HID Global

Citrix Systems, Inc.
sponsored by Symantec
WHITE PAPER: This case study reveals how Citrix Systems, Inc. wanted to move two-factor authentication (2FA) into the cloud to reduce costs and improve flexibility and reliability.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Symantec

SSO in the Cloud and Mobile Era
sponsored by TechTarget
RESOURCE: Does enterprise single sign-on (SSO) provide adequate security? Our exclusive resource, SSO in the Cloud and Mobile Era, explores the promises and challenges ahead for SSO technology.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

TechTarget

Aruba Clearpass Network Access Control
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn how mobility and IoT are changing how organizations approach network access control (NAC) and how switching to security tools like Aruba Clearpass can help detect threats before damage occurs.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Privilege Management Overview: Strengths and Challenges
sponsored by One Identity
ANALYST REPORT: In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

One Identity

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID Global
RESOURCE: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID Global

Simplify Authentication with Personal Identity Verification
sponsored by HID Global
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID Global

The Pitfalls and Promises of Authentication in the IoT
sponsored by iovation, Inc.
WEBCAST: Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.
Posted: 07 Aug 2017 | Premiered: Aug 7, 2017

iovation, Inc.

Overcome Authentication Challenges: Balancing Security and User Experience
sponsored by iovation, Inc.
VIDEO: How can you increase authentication security without impacting user experience? Take a closer look at flexible authentication that can help you meet these challenges with global fraud and trust insight, interactive multi-factor authentication, and more.
Posted: 01 Aug 2017 | Premiered: 01 Aug 2017

iovation, Inc.

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017

One Identity

Don't Let SaaS Cloud Your Security
sponsored by Verizon
WHITE PAPER: The cloud is transforming all aspects of business, so the need for cloud security is more important than ever. Key into this white paper to discover 5 ways to stay secure in the cloud.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon

20 Practical Tips for Single Sign-On Implementation
sponsored by Imprivata
WHITE PAPER: Uncover 20 valuable tips to ensure successful SSO for your organization, so that your care providers can spend less time remembering passwords and more time treating patients.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Imprivata
26 - 50 of 237 Matches Previous Page    1 2 3 4 5    Next Page
 
AUTHORIZATION DEFINITION (continued): … Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating system or application, the system or application may want to identify what resources the user can be given during this session. Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system adminstrator and the actual checking of the permission values that have been set up when a user is getting access.Logically, authorization is preceded by authentication.
Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement