IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Multimedia (View All Report Types)
15 Matches
What Really Happened with the Capital One Attack and how to Prevent it
sponsored by Aporeto
WEBCAST: The Capital One data breach on July 30, 2019 was due to the exploitation of a well-known class of security vulnerabilities that are based on security relying on credentials. In this video, listen as Aporeto CTO, Dimitri Stiliadis discusses the root cause and how to prevent a breach with Aporeto.
Posted: 18 Oct 2019 | Premiered: Oct 18, 2019

Aporeto

Key Considerations for a Successful Zero Trust Security Strategy Webinar
sponsored by Aporeto
WEBCAST: Tune into this 60 minute webinar to hear Trace3 and Aporeto discuss the Zero-Trust security framework components and what to consider for a successful cloud security strategy.
Posted: 09 Oct 2019 | Premiered: Oct 9, 2019

Aporeto

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

5 Steps to Minimize Your Exposure to Ransomware Attacks
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

The Anatomy of a Hack: Perception vs. Reality
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Zero Trust Access Video
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 13 Aug 2019 | Premiered: 13 Aug 2019

PortSys

Important Things You Need to Know about Storing Your Identity
sponsored by RSA Conference
VIDEO: Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.
Posted: 31 Jul 2019 | Premiered: 16 May 2019

RSA Conference

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

HID Global's ActivID® Authentication: Online Banking
sponsored by HID Global
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID Global

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning
sponsored by Intel
WEBCAST: Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel
15 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement