IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 547 Matches Previous Page  |  Next Page
Understanding the Role of Stolen Credentials in Data Breaches
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn the 2 steps of a successful credential theft, then learn about a service that fights back against both of these attack paths.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Palo Alto Networks

Understanding Identity Governance
sponsored by SailPoint Technologies
EBOOK: Identity governance is one of the more undervalued aspects of enterprise security. Read this white paper to learn why every organization needs identity governance, the four steps to building the case for it, and how you stand to benefit.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

SailPoint Technologies

A Collaborative Strategy for Your Access Management
sponsored by SailPoint Technologies
WHITE PAPER: Today's rapidly changing business environment demands that businesses be agile, innovative and secure. This white paper examines a collaborative strategy of integrating Microsoft Azure Active Directory with the identity governance capabilities of SailPoint Power of Identity.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

SailPoint Technologies

Aruba Campus Switching: The Foundation for the Modern Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Privilege Management Overview: Strengths and Challenges
sponsored by One Identity
ANALYST REPORT: In this report, learn why privilege management should be an essential element of your cybersecurity infrastructure. Plus, discover a review of a privilege management tool with details on key features, strengths, and challenges.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

One Identity

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID Global
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016

HID Global

6 Pillars of Big Data: How to Harness Data with Tableau
sponsored by Tableau Software
WHITE PAPER: Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of a big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Tableau Software

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Put Your Business Content to Work
sponsored by IBM
MICROSITE: In this comprehensive resource hub, access 13 guides that will enable you to discover how to extract the most value from your business content and how to make it work for you. Learn about content engagement, data and information governance, sales transformation, and much more.
Posted: 28 Jul 2016 | Published: 28 Jul 2016

IBM

IBM MaaS360 Mobile Application Management
sponsored by IBM MaaS360
RESOURCE: Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.
Posted: 21 Jun 2016 | Published: 29 Jan 2016

IBM MaaS360

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

DataWorks Solution Brief
sponsored by IBM
WHITE PAPER: 42% of business professionals spend more than 40% of their time fixing and validatiing data before analyzing it. With increasing amounts of data coming from new technologies, this is a major pain point. Read on to learn about a solution that delivers data quality and easy access for business users.
Posted: 09 Jun 2016 | Published: 31 Dec 2015

IBM

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

The Business Case for Hybrid Networks
sponsored by MASERGY
WHITE PAPER: The market for hybrid network services is growing rapidly which is driven by the increase in enterprise bandwidth consumption — growing by 30% a year, according to Gartner market research. Access this white paper now to discover if a hybrid network is right for your business.
Posted: 21 Mar 2016 | Published: 07 Mar 2016

MASERGY

Secure Architecture for Mobile Device Access to On-Premise Applications
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This white paper examines a technical architecture that enables apps installed on mobile devices to access security-sensitive apps deployed inside a private network perimeter.
Posted: 17 Mar 2016 | Published: 14 May 2015

Hitachi ID Systems, Inc.

Computer Weekly: Robots at Your Service
sponsored by ComputerWeekly.com
EZINE: Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
Posted: 11 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies.
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 01 Feb 2016 | Published: 29 Jan 2016

CA Technologies.
1 - 25 of 547 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement