IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 504 Matches Previous Page  |  Next Page
DTEX and the Insider Threat Kill Chain
sponsored by Dtex
EBOOK: Understanding insider attacks requires a bit more depth. You must ask, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

Dtex

EMA Evaluation Guide to Privileged Access Management (PAM)
sponsored by Remediant
WHITE PAPER: Enterprise Management Associates (EMA) reports that 76% of organizations experience privileged access policy violations each year despite 79% reporting that privileged access management (PAM) is ‘very important’ or ‘critical’ to their operations. Want to learn more? Read the EMA’s evaluation guide to PAM to discover other important trends.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Remediant

Remediant Framework Mapping and Assessment
sponsored by Remediant
RESOURCE: The NIST Access Controls framework consists of 23 requirements that should be included in offering – these are often closely related to industry trends and observations. Download this report to discover the results of Remediant’s NIST framework mapping & assessment.
Posted: 13 Aug 2020 | Published: 28 May 2020

Remediant

Fortinet Acquires Cloud Security and Networking Innovator OPAQ Networks
sponsored by Fortinet, Inc.
RESOURCE: Secure Access Service Edge (SASE) and Zero Trust Network Architecture (ZTNA) can provide evolved threat protection on their own, but when put together, organizations can be remote ready during this unprecedented time. Read this blog post that details Fortinet’s acquisition of OPAQ, which will allow SASE to meet ZTNA.
Posted: 12 Aug 2020 | Published: 20 Jul 2020

Fortinet, Inc.

Cloud Access Security Brokers: Top Vendors & Offerings
sponsored by McAfee
RESOURCE: The popularity of Cloud Access Security Brokers (CASBs) as an effective measure for cloud data protection is on the rise. In order to help you select the right vendor for your unique needs, Gartner conducted a comprehensive analysis of the top CASB vendors and offerings in today’s market – read on to unlock the Magic Quadrant report.
Posted: 11 Aug 2020 | Published: 05 Nov 2019

McAfee

Panel Discussion: Securing the Cloud
sponsored by Dell SecureWorks
WEBCAST: The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.
Posted: 10 Aug 2020 | Premiered: Aug 10, 2020

Dell SecureWorks

Microsoft Teams Guest Access: To Do or Not to Do?
sponsored by Nucleus Cyber
RESOURCE: In this blog, learn how NC Protect provides the context and content awareness to adapt access controls and sharing rights down to the file or chat message level to ensure your employees and guest can collaborate securely.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Nucleus Cyber

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Privileged Account Management for Dummies
sponsored by IBM
EBOOK: In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

2019 Report for Identity Governance & Administration
sponsored by IBM
RESOURCE: For the fifth consecutive year, Gartner has named IBM a Leader in the Magic Quadrant for Identity Governance & Administration (IGA). With IBM, clients have access to the broadest set of IGA capabilities on their journey to the cloud.
Posted: 07 Aug 2020 | Published: 09 Oct 2019

IBM

Identity & Access Management from IBM
sponsored by IBM
RESOURCE: Although intricate, identity and access management (IAM) has become a key practice for effective risk management and information security programs. The following resource contains an interactive whitepaper, which uses a helpful metaphor to demonstrate the value of IAM.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
sponsored by IBM
RESOURCE: Digital identities are critical to online interactions – especially when it comes to provisioning (or barring) access to information, applications or other identities. The following web page highlights a guide for optimizing digital identity risk and experience – read on for more information.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

IBM

An overview of IBM’s identity & access management services
sponsored by IBM
WHITE PAPER: This Forrester study, commissioned by IBM, provides an unbiased look at the potential benefits, costs and risk areas of IBM’s Identity and Access Management (IAM) services. Download the report to unlock the key findings from the study and explore a use case that demonstrates the potential of adopting IBM’s IAM services
Posted: 06 Aug 2020 | Published: 06 Aug 2020

IBM

University Hospital Gets the Most Out of Mobility with Total Access Control
sponsored by PortSys
CASE STUDY: For Milton Keynes University Hospital (MKUH), enabling and securing access for every device, regardless of location, became critical as they looked to modernize their operations. In this case study, discover why MKUH decided to partner with PortSys and implement a zero-trust approach to access management in the form of Total Access Control.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

PortSys

Credential Stuffing Attacks Threaten Businesses in Asia-Pacific
sponsored by Akamai Technologies
RESOURCE: The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Akamai Technologies

Predictive Identity: A Key Enabler for a Successful Merger or Acquisition
sponsored by SailPoint Technologies
EBOOK: This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

Peer Insights: Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition
sponsored by CyberArk Software, Inc
EBOOK: Has your organization suffered from a preventable vulnerability? Has one your employees misused privileged access? Does your architecture have security pain points that need addressing? Read Privileged Access Management (PAM) as-a-Service for Dummies to find out how to secure accounts and reduce risk.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

CyberArk Software, Inc

Identity Governance & Administration (IGA)
sponsored by SailPoint Technologies
WHITE PAPER: In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.
Posted: 04 Aug 2020 | Published: 30 Apr 2019

SailPoint Technologies

Privileged Access Management
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.
Posted: 04 Aug 2020 | Published: 07 May 2020

CyberArk Software, Inc

SailPoint Predictive Identity
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.
Posted: 03 Aug 2020 | Published: 30 Apr 2020

SailPoint Technologies

Protecting Intellectual Property with Data Access Governance
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

SailPoint Technologies

SIG - Axcess Financial Customer Story
sponsored by Cisco Umbrella
CASE STUDY: In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

Maintain Business Continuity with Aruba's Remote Access Solutions
sponsored by Aruba Networks
DATA SHEET: More people than ever before are now working remotely. But everyone still needs secure, reliable access to systems and applications, no matter where they are. How do you open up your network and still keep data secure? In this brief, learn how Aruba’s remote access solutions can help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks

The Future of Security and Compliance Starts Here
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

SailPoint Technologies
1 - 25 of 504 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info