IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 448 Matches Previous Page  |  Next Page
Securing Transportation Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.
Posted: 16 Sep 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Scaling Identity Management to Ensure Customer Loyalty Program Success: Four Case Studies
sponsored by Akamai Technologies
CASE STUDY: To successfully grow their loyalty programs and initiatives, leading enterprises are turning to customer identity and access management (CIAM) solutions. In this white paper, learn about the CIAM challenges associated with customer loyalty programs. Also, discover how to address these challenges based on 4 real-world case studies.
Posted: 13 Sep 2019 | Published: 30 Apr 2019

Akamai Technologies

A Guide for Customer Identity and Access Management (CIAM)
sponsored by Akamai Technologies
WHITE PAPER: When implementing the concepts, processes, and technologies needed to collect, manage, and utilize digital identity and customer data, companies have 2 basic choices: build or buy. In this white paper, explore the pros and cons of in-house software development versus commercial off-the-shelf solutions.
Posted: 13 Sep 2019 | Published: 31 May 2019

Akamai Technologies

Rethinking Third-party Cyber Risk Management
sponsored by CyberGRX
WHITE PAPER: In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

CyberArk Privilege Cloud Reduces Risk with PAM SaaS
sponsored by CyberArk Software, Inc
RESOURCE: Creating and executing a successful privileged access security program can seem like a daunting task. Privileged access is pervasive throughout the enterprise and can be difficult to manage without the right tools. In this blog, learn how CyberArk Privilege Cloud can help organizations start their privileged access management journey.
Posted: 10 Sep 2019 | Published: 01 Aug 2019

CyberArk Software, Inc

Office 365 Anti-Phishing Tools
sponsored by Cisco Umbrella
EGUIDE: Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.
Posted: 06 Sep 2019 | Published: 04 Sep 2019

Cisco Umbrella

SailPoint Predictive Identity™: The Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: Digital transformation has opened up opportunities for greater growth but, it's also introducing challenges. Digital transformation means more users, more apps, and more data – and if not properly addressed, also means more risk. In this solution brief, learn how organizations can address this risk with the help of SailPoint Predictive Identity.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

SailPoint Technologies

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

5 Steps to Minimize Your Exposure to Ransomware Attacks
sponsored by Centrify Corporation
WEBCAST: According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

The Anatomy of a Hack: Perception vs. Reality
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Zero Trust Privilege for Dummies
sponsored by Centrify Corporation
EBOOK: To better protect against data breaches, the use of a Zero-Trust model has returned to the spotlight and seen huge growth in adoption. Instead of using the traditional approach of "trust, but verify," the Zero-Trust model implements "never trust, always verify" as its guiding principle. Download Zero Trust Privilege For Dummies to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

A Darwinian Approach to Reducing Government Cyber Risk
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: Several key trends are creating a new wave of challenges threatening the security of sensitive and classified government data. Fortunately, identity governance is evolving to counter these threats and reduce risk. In this brief, learn more about these challenges and how SailPoint can help by delivering a predictive approach to identity governance.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

SailPoint Technologies

Co-Operative Group's Identity Infrastructure Governs Data, Applications & Users
sponsored by SailPoint Technologies
CASE STUDY: The Co-operative Group was struggling to manage and govern access for over 70,000 employees. They lacked a comprehensive identity governance platform to assist with these efforts. Download this case study to learn how the Co-operative Group was able to address these challenges by using SailPoint's identity governance program.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

SailPoint Technologies

The 2019 Zero Trust Privilege Maturity Model Report
sponsored by Centrify Corporation
ANALYST REPORT: To provide context around the current state of Zero Trust Privilege, Centrify surveyed 1,300 information security professionals. Download this 2019 report to learn more about the Zero Trust Privilege Maturity Model and discover key findings from the survey.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Centrify Corporation

SailPoint IdentityNow Powered by AI and Machine Learning
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: Yesterday's human-based governance approach can no longer keep up with today's exponential growth. Download this brief to learn about SailPoint IdentityNow which introduces the next generation of identity governance to help organizations make intelligent identity decisions with the power of AI and machine learning.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

SailPoint Technologies

How Manulife Is Advancing Its Identity Governance Program with IdentityIQ
sponsored by SailPoint Technologies
CASE STUDY: Manulife is advancing their identity governance program with IdentityIQ. In this case study, learn how Manulife was able to reduce risk, improve customer experience, increase efficiency and plan for the future.
Posted: 30 Aug 2019 | Published: 30 Jun 2019

SailPoint Technologies

6 Steps to Achieving Data Access Governance
sponsored by One Identity
WHITE PAPER: Organizations need to satisfy compliance requirements and be able to quickly address security threats. They need to centralize the access request process and put an end to ambiguity about who has access to what. In this white paper, discover how organizations can achieve this by following 6 steps to implement data access governance.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

One Identity

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
WHITE PAPER: This white paper evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the challenges you face. Read on to learn more.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

One Identity

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

The New Frontiers of Identity
sponsored by SailPoint Technologies
WEBCAST: While digital transformation has opened new paths to success, it has also created new frontiers for identity governance that must be addressed. In this webcast, Paul Trulove of SailPoint explains how you can take a comprehensive approach to identity governance.
Posted: 28 Aug 2019 | Premiered: Aug 28, 2019

SailPoint Technologies

Strategies to Ensure Success for your Governance Project
sponsored by One Identity
EBOOK: In years past when talking about IAM, the hot topics were single sign-on and role-based access control. However, governance is the goal now, and many organizations are finding it hard to reach. Learn about Identity and Access Governance (IAG), why it's important and how your organization can make an IAG program successful.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

One Identity

8 Best Practices for Identity and Access Management
sponsored by One Identity
WHITE PAPER: In this white paper, find 8 key practices that can help you improve your identity management system to ensure better security, efficiency and compliance.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

One Identity

Sailpoint Enabling and Securing Digital Identities
sponsored by SailPoint Technologies
VIDEO: SailPoint's open identity platform helps enterprises see everything, govern everything and empower everyone. Download this video to learn how SailPoint's identity platform helps enterprises enable their workforce by securing digital identities.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019

SailPoint Technologies
1 - 25 of 448 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement