IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 438 Matches Previous Page  |  Next Page
Leading Change for CISOs: Embedding a Secure Culture
sponsored by RSA Conference
WEBCAST: There was a time when cybersecurity was strictly a concern for IT departments, but those days are long gone. In today’s far-reaching threat environment, cybersecurity needs to be baked into the very fabric of a company. In this webcast, learn how organizations can leverage organizational change models for an all-inclusive culture of security.
Posted: 21 Jan 2020 | Premiered: Oct 2, 2019

RSA Conference

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

Comprehensive Lifecycle Management
sponsored by Insight
WEBCAST: The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.
Posted: 20 Jan 2020 | Premiered: Jan 20, 2020

Insight

Securing the workplace of the future
sponsored by Tehama
WHITE PAPER: A stolen or compromised identity is at the heart of many of the major data breaches you read about in the news. With virtual access becoming the norm, ensuring protection for a borderless workplace is critical to maintaining a secure environment. In this white paper, explore 3 key best practices for securing your digital workforce.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tehama

Cisco Umbrella & Duo Security: Protect users and secure access to applications
sponsored by Cisco Umbrella
DATA SHEET: As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Cisco Umbrella

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
RESOURCE: With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

PortSys

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

Digital Identity Security Assurance: How to Keep Your Customer Data Secure
sponsored by Akamai Technologies
WHITE PAPER: Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.
Posted: 23 Dec 2019 | Published: 30 Nov 2019

Akamai Technologies

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys

The Cybersecurity Guide: Defending from Threats and Preventing Hacks
sponsored by A-Lign
WHITE PAPER: Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

How Okta Integrates Applications: An Architectural Overview
sponsored by Okta
DATA SHEET: In this product overview, discover how Okta uniquely enables SSO into any web or mobile application using open standards, or proprietary APIs, or Secure Web Authentication (SWA) and by SAML-enabling on-prem web applications.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Transform the Customer Experience with a Modern Customer IAM Solution
sponsored by Okta
WHITE PAPER: Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Managing Customer & Partner Identities
sponsored by Okta
WHITE PAPER: As a business, the last thing you want to do is make it difficult for users to log in by challenging them with cumbersome authentication processes. IT leaders are transitioning from on-prem identity management solutions to cloud-based identity as a service (IDaaS). Read this white paper to uncover the key functions and benefits of IDaaS.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Preventing PeopleSoft Breaches
sponsored by Appsian
WHITE PAPER: Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Appsian

14 Zero Trust eXtended (ZTX) Ecosystem Providers
sponsored by Okta
ANALYST REPORT: Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.
Posted: 06 Dec 2019 | Published: 29 Oct 2019

Okta

Getting Started with Zero Trust: Never Trust, Always Verify
sponsored by Okta
WHITE PAPER: As organizations continue to rely on remote workforces and mobile devices, formal perimeters are vanishing, and traditional security measures are no longer reliable. This white paper explores the shifts in the security landscape that led to the creation of zero-trust and how organizations can implement a zero-trust program.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Okta Identity Management for Portals Built on Salesforce.com
sponsored by Okta
WHITE PAPER: Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Decoding Customer IAM (CIAM) vs. IAM
sponsored by Okta
WHITE PAPER: While most organizations can agree that identity and access management (IAM) is essential to data protection, there is a split between those who adopt broad IAM and customer-focused IAM (CIAM). This white paper provides an overview of IAM and CIAM and highlights the key similarities and differences between them.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Identity Layer for Web and Mobile Applications
sponsored by Okta
DATA SHEET: This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Top 5 Reasons to Automate Identity Lifecycle
sponsored by Okta
WHITE PAPER: As perimeters become fuzzy with mobile workers, BYOD, and third-party users integrating into the environment, organizations are facing an identity lifecycle problem. In this white paper, uncover 5 reasons to automate identity lifecycle and how it can help manage employee access.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

Passwordless Datasheet
sponsored by Okta
DATA SHEET: Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Consumer Identity Management for the CMO, CISO, and CIO
sponsored by Okta
WHITE PAPER: As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

7 Considerations for Implementing Zero Trust
sponsored by Banyan Security
RESOURCE: Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Banyan Security

Zero Trust Remote Access Platform
sponsored by Banyan Security
PRODUCT OVERVIEW: Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.
Posted: 05 Dec 2019 | Published: 30 Nov 2019

Banyan Security
1 - 25 of 438 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info