IT Management  >   Systems Operations  >   Security  >  

AAA

RSS Feed   
ALSO CALLED: Authentication, Authorization and Accounting, 3A, Access Authentication and Authorization, Administration (Security), Authentication, Authorization, and Accounting
DEFINITION: Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. These combined processes are considered important for effective network management and security.As the first process, authentication provides a way of identifying a  … 

AAA definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
AAA Reports
1 - 25 of 406 Matches Previous Page  |  Next Page
10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

4 Actions IT Can Take to Ensure Business Continuity Using PKI Automation
sponsored by Sectigo
EBOOK: Managing risks has never been a greater challenge for IT professionals, and this is especially true when considering identity management. With an increasing number of angles for bad actors to steal passwords, it may be time for an evolution in authentication. Jump into this e-book to learn about public key infrastructure.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi ID
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi ID

5 Steps to Minimize Your Exposure to Ransomware Attacks Webinar
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

5 Ways to Maintain Complete Control Over Your Data and Resources in The Cloud
sponsored by Ionic Security
PRODUCT OVERVIEW: In order to address the increasing challenges of maintaining data security and privacy in cloud environments, organizations are opting for partners who enable them with complete control over security, access control, data insights and more. Download this solution brief to discover 5 ways Google Cloud EKM may be able to fit this role.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Ionic Security

A catalyst for change
sponsored by Onfido
EBOOK: Biometrics offer an additional later of security to identify customers but come with a host of privacy and ethical concerns that must be addressed. In this security newsletter, “The Future of Authentication,” experts debate the pros and cons, debunk common myths, and get into the ethics of biometrics. Open the PDF to get started.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Onfido

A Fast Path Guide to Success
sponsored by Appsian
RESOURCE: For financial risk management and security leaders, protecting legacy ERP data in the age of remote work is shaping up to be a significant challenge in the new year. Read this blog post to learn more about the Appsian Security Platform and how its features are designed to identify remote security risks and protect ERP data.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

A Guide to MAM and Planning for BYOD Security in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

A RISK-BASED APPROACH TO INSIDER THREAT DETECTION FOR FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

A Step-by-Step Guide: Achieving Zero Standing Privilege
sponsored by Remediant
WHITE PAPER: Privileged access management has changed how organizations keep users in check, but as it turns out, it is not enough. 74% of breached organizations admitted that the breach was made through a privileged account. The issue is standing access. Learn about the benefits of zero standing privilege in this step-by-step guide.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant

Access Requests
sponsored by SailPoint Technologies
VIDEO: In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

ACT.md Sees 2x Dev Savings With Auth0
sponsored by Auth0
RESOURCE: To serve patients well, providers need fast and secure access for a wide variety of health and government institutions, each with different ways of verifying identity. In this case study, learn how ACT.md was able do so using Auth0.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Auth0

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 03 Jun 2019 | Published: 30 May 2019

Onfido

5 Trends to Watch in 2018 for Content Management Systems
sponsored by Enginess
EGUIDE: In this e-guide, content management expert Geoffrey Bock, dives into what's in store for content management in 2018 – think smart content getting smarter, omnichannel delivery advancements, digital asset management and more.
Posted: 15 Jun 2018 | Published: 31 Dec 2017

Enginess

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Global Knowledge

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

ActivID® Authentication Appliance for Enterprise
sponsored by HID Global
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID Global
1 - 25 of 406 Matches Previous Page    1 2 3 4    Next Page
Browse by Report Type:
AAA White Papers | AAA Multimedia | AAA IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences