IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 351 Matches Previous Page  |  Next Page
You Can Get IAM Right
sponsored by One Identity
WHITE PAPER: In this book created exclusively for the RSA Conference, delve into the most pressing IAM issues faced by virtually every organization and sustainable approaches to the IAM challenges you face today.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

One Identity

Ensure That Biometric Authentication Technologies Are Secure
sponsored by Onfido
EGUIDE: Biometrics are often perceived as being more secure than traditional passwords. However, this is not always the case. In this e-guide, learn how researchers at the University of North Carolina at Chapel Hill achieved authentication using a virtual reality model of an authorized user's face.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Onfido

The Power of Trust between Businesses and Consumers
sponsored by Micro Focus
WHITE PAPER: From logging in to logging out and everything in between, modern authentication enables a positive customer interaction with your digital systems. In this white paper, learn how you can leverage today's technologies, such as multifactor authentication, to strike a balance between security, convenience, and long-term opportunities.
Posted: 04 Mar 2019 | Published: 31 Jul 2018

Micro Focus

The Journey to IAM Success
sponsored by One Identity
WHITE PAPER: IAM is becoming a valuable enabler but, planning and deploying IAM is not without its challenges. In this white paper, discover first-hand opinions, lessons learnt and recommendations from senior peers in several global brands who have experienced the trials and triumphs of implementing their own IAM programs.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

One Identity

Strategies to Get IAM Right
sponsored by One Identity
WHITE PAPER: How can you make sure that your IAM project doesn't become another wreck on the road to security and compliance? In this e-book, find common characteristics of failed projects, the consequences of a poorly executed IAM program, and a recipe for IAM success.
Posted: 28 Feb 2019 | Published: 31 Dec 2017

One Identity

Biometrics: Learn the advantages and disadvantages
sponsored by Onfido
EGUIDE: When used in conjunction with other authentication factors, like passwords or tokens, biometric authentication methods have the potential to improve security as well as the user experience. In this e-guide, learn about the advantages of biometrics.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Onfido

2018 State of IBM i Security Study
sponsored by HelpSystems
RESEARCH CONTENT: Cyberthreats are becoming more sophisticated every year, raising the importance of proper security controls. Weak passwords, lax system auditing, and overly privileged users leaves your server vulnerable to internal and external threats. In this research report, learn about the full extent of IBM i security exposures and how to correct them.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

HelpSystems

How Blockchain Transforms Data Security
sponsored by ALTR
WHITE PAPER: The blockchain design pattern is not just about supporting digital currencies or rethinking every human system of trust. Its basic security-related characteristics have the potential to stem today's overwhelming tide of data breaches. In this white paper, learn more about blockchain and how it can help your organization protect sensitive data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

ALTR

ALTR's Transformational, Blockchain-Based Data Security Platform Neutralizes the Privacy and Breach Exposures Created by the People Inside of Networks.
sponsored by ALTR
RESOURCE: Data risk is a part of almost every urgent technology conversation in the enterprise. Most issues are a result of the humans that are inextricable parts of our networks. Fortunately, the ALTR platform reduces data risks to virtually zero. In this white paper, learn how ALTR's platform provides visibility control and protection over valuable data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

ALTR

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

ComputerWeekly.com

Build vs. Buy - Guide to Identity Management
sponsored by Auth0
WHITE PAPER: Learn how you can reap the benefits of an identity management platform, today.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

The Total Economic Impact™ of the Auth0 Identity Platform
sponsored by Auth0
ANALYST REPORT: Download this Forrester TEI report to better understand the benefits, costs, and risks associated with the AuthO identity platform.
Posted: 05 Oct 2018 | Published: 31 Oct 2017

Auth0

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

OneLogin

Fully Managed Microsoft Azure Includes Security Services
sponsored by Rackspace Microsoft
WHITE PAPER: Click inside to discover a cloud provider that will help you protect your Azure environments. Read on to learn how they can help to extend your Azure Active Directory IAM system beyond its normal limits, remediate breaches immediately with pre-approved actions, and more.
Posted: 02 Feb 2018 | Published: 22 Mar 2017

Rackspace Microsoft

Improve End-to-end Security with Aruba Clearpass
sponsored by Aruba Networks
RESOURCE: In this resource, learn how to protect all devices corporate, IoT, BYOD- wired and wirelessly to tighten up end-to-end security from unauthorized users.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

5 Reasons Enterprises Need a New Access Model
sponsored by Akamai Technologies
WHITE PAPER: As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new application access management model.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai Technologies

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

Computer Weekly: Robots at Your Service
sponsored by ComputerWeekly.com
EZINE: Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
Posted: 11 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS
1 - 25 of 351 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement