IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization White Papers (View All Report Types)
1 - 25 of 125 Matches Previous Page  |  Next Page
Okta Identity Management for Portals Built on Salesforce.com
sponsored by Okta
WHITE PAPER: Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Top 5 Reasons to Automate Identity Lifecycle
sponsored by Okta
WHITE PAPER: As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Are Bots Killing Your Business Intelligence?
sponsored by F5 Networks
WHITE PAPER: While it’s known that bots can disrupt websites, enable fraud, and steal data, bots can also impact the business intelligence you rely on to make strategic decisions by skewing audience metrics. With the right tools, you can filter out unwanted traffic and improve the quality of your data. Read on to get started.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

The Evolution of Zero Trust
sponsored by Banyan Security
WHITE PAPER: As cloud computing and mobile devices increase in popularity, traditional perimeters are less relevant, and the idea of trust is changing. In this white paper, explore the various iterations of Zero Trust models and how they’ve evolved to adapt to modern requirements.
Posted: 03 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Get Your App Ready for the Global B2B Market
sponsored by Okta
WHITE PAPER: To foster a healthy relationship with enterprise partners and customers, you need to allow those users to use their existing enterprise identities to access your applications or shared resources. In this white paper, learn about 4 ways to integrate your enterprise applications and internal systems with your partners and customers’ identities.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

Accelerating the Journey to Passwordless Authentication
sponsored by IBM
WHITE PAPER: A recent study conducted by EMA found that while over 90% of organizations experienced a password policy violation over the past year, a vast majority continued to rely on traditional passwords. Read on to understand some of the vulnerabilities of traditional passwords and uncover sustainable, secure alternatives.
Posted: 19 Nov 2019 | Published: 31 Jul 2019

IBM

Getting Started with Zero Trust Never trust, Always Verify
sponsored by Okta
WHITE PAPER: There is no silver bullet when it comes to achieving a zero-trust security architecture, but identity and access management is the core technology that organizations can start with on their Zero Trust journeys. Read on to learn the benefits of Zero Trust and what a framework looks like today.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Okta

IBM Identity and Access Management Services: Costs and Benefits
sponsored by IBM
WHITE PAPER: Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.
Posted: 14 Nov 2019 | Published: 30 Jun 2019

IBM

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Now Tech: Authentication Management Solutions, Q3 2018
sponsored by IBM
WHITE PAPER: Organizations use authentication management to simplify processes, reduce operational costs and enhance customer experience by minimizing friction. But selecting a vendor can be overwhelming.In this Forrester report, explore the features of 26 diverse providers in order to help you find a vendor that meets your organizational needs.
Posted: 12 Nov 2019 | Published: 07 Aug 2018

IBM

The Challenges of Trusted Access in a Cloud-First World
sponsored by Thales
WHITE PAPER: With over 1,050 participants, the 2019 Thales Access Management Index revealed common security trends, concerns and access management technologies around cloud adoption used by today’s organizations. Download the executive summary to uncover the key findings and takeaways towards secure access management.
Posted: 12 Nov 2019 | Published: 31 Jul 2019

Thales

Securing Robotic Procession Automation (RPA) with CyberArk
sponsored by CyberArk Software, Inc
WHITE PAPER: Robotic process automation (RPA) enables businesses to execute their digital transformation initiatives by providing a framework to carry out processes faster, longer, more efficiently & with a higher level of quality. In this cheat sheet, discover the benefits of RPA & a service designed to add a layer of security to your RPA strategy.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

CyberArk Software, Inc

Integrating Password and Privilege Management for Unix and Linux Systems
sponsored by BeyondTrust Corporation
WHITE PAPER: With the knowledge that cyberattacks are often targeted towards accounts with privileged access, organizations often include privileged access management (PAM) at the top of their project list. This report uncovers why PAM strategies are critical to a robust security program.
Posted: 06 Nov 2019 | Published: 31 Jan 2019

BeyondTrust Corporation

Buyer’s Guide for Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

Five Steps To A Zero Trust Security Strategy Q&A
sponsored by Ionic Security
WHITE PAPER: Following a recent webcast on the zero-trust approach, Stephanie Balaouras, Vice President, Research Director for Security & Risk at Forrester Research participated in a Q&A with audience members. Review some of Balaouras’ insights on data-centric security strategy approaches.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ionic Security

Protecting Privileged Access Is Critical to the Protection of a Company’s Crown Jewels
sponsored by CyberArk Software, Inc
WHITE PAPER: In this infographic from Privileged Access Security for Dummies, discover some tips & best practices when it comes to protecting your company’s data. Learn how to: Secure critical information, reduce cyberattack risk, and take preventative security action.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

CyberArk Software, Inc

Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

Mobile Fraud Detection: Top 4 Threats to the Mobile Channel
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

Privileged Access Management Buyers' Guide
sponsored by Centrify Corporation
WHITE PAPER: This buyers' guide is designed to help you choose the right privileged access management solution for your organization. Read on for the 9 major areas needed for your company to achieve strong privileged access management, and compare the features and capabilities to look for when selecting a solution.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Centrify Corporation

Top 5 Reasons to Put Privilege First
sponsored by CyberArk Software, Inc
WHITE PAPER: The reality is that no organization can ever fully secure all of their applications and infrastructure. Protection from all of the various methods that attackers may use is impossible; they will get in, it's what they do. In this white paper, learn why prioritizing privileged access should be at the core of every organization's strategy.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

CyberArk Software, Inc

Securing Hospitality IT Infrastructure
sponsored by CyberArk Software, Inc
WHITE PAPER: When it comes to cybersecurity, the hospitality industry has a threat surface unlike any other vertical sector. Privileged accounts are everywhere in the hospitality industry technology stack. In this white paper, learn what hospitality organizations should do to reduce the risk posed to privileged access by attackers.
Posted: 26 Aug 2019 | Published: 30 Apr 2019

CyberArk Software, Inc
1 - 25 of 125 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement