IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 540 Matches Previous Page  |  Next Page
Goodbye 2FA. Hello Modern MFA
sponsored by Ping Identity Corporation
WEBCAST: 81% of hacks involve weak or stolen credentials. Although typical multi-factor authentication is a step in the right direction, many have limited coverage, poor user experience and minimal policy options. The modern versions of MFA are more adaptive and dynamic. In this webcast, learn how contextual MFA eliminates weak credentials.
Posted: 19 Dec 2018 | Premiered: Dec 12, 2017

Ping Identity Corporation

Leading the Way with Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: According to the 2018 Verizon Data Breach Report, the hospitality industry is one of the top five industries subjected to network breaches every year. Learn how OpenKey, a company leading the way with secure mobile keyless hotel access, was able to securely host their customer data with a private cloud provider.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Armor

Build vs. Buy - Guide to Identity Management
sponsored by Auth0
WHITE PAPER: Learn how you can reap the benefits of an identity management platform, today.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

SmartKey Security Overview
sponsored by Equinix
RESOURCE: Learn how your enterprise can protect its most sensitive data in any cloud environment.
Posted: 21 Nov 2018 | Published: 21 Nov 2018

Equinix

IAM: Key to security and business success in the digital era
sponsored by ComputerWeekly.com
EGUIDE: As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

ComputerWeekly.com

Protect Against Compromised Accounts
sponsored by Proofpoint, Inc.
VIDEO: According to recent data from the FBI, in the last 5 years, there have been more than 78K business email account compromise scam incidents worldwide. Download this webcast to learn about why account compromises are on the rise, how they are affecting businesses, and how cybercriminals perform the attack, and more.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Is Your Software Simple? Assess How Well the PAM Software You Choose Supports Your Goals
sponsored by Thycotic
RESOURCE: Is the Privileged Access Management (PAM) software you chose right for your business? Take this simple test to find out.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Thycotic

The Total Economic Impactâ„¢ of the Auth0 Identity Platform
sponsored by Auth0
ANALYST REPORT: Download this Forrester TEI report to better understand the benefits, costs, and risks associated with the AuthO identity platform.
Posted: 05 Oct 2018 | Published: 31 Oct 2017

Auth0

The Journey to IAM Success
sponsored by One Identity
EBOOK: Read this insightful overview of IAM-project strategy from organizations that have made the journey to IAM success. Discover their recommendations for planning and executing your IAM project.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

One Identity

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
RESOURCE: Discover the importance of identity governance and how you can effectively manage it while taking account of complexity, compliance and limited IT resources.
Posted: 01 Oct 2018 | Published: 31 Dec 2017

One Identity

How to Protect Privileged Accounts with an Incident Response Plan
sponsored by Thycotic
RESOURCE: Today, cybercriminals can create a blueprint of the entire network and operations. Discover the telltale indicators you're under attack and the plans you need to have in place to protect your privileged accounts.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Thycotic

Protecting and Monitoring Access to a State's Systems
sponsored by One Identity
CASE STUDY: Learn how this state improves security, efficiency, and insight into who accesses which systems by replacing 18 IAM systems with a comprehensive platform from One Identity.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Building a Smart City Starts with Security
sponsored by One Identity
CASE STUDY: Smart-city technologies support exciting innovations while improving quality of life for citizens. But, with more sensors collecting data in the field, comes greater security risks. Find out how one city was able to develop their smart capabilities while mitigating security risks.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk
sponsored by One Identity
VIDEO: In this webinar, take a look at the top 5 ways for analyzing account entitlements and learn how areas of risk can be identified before a user (or cybercriminal) can abuse their access.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

The Future of Privilege Management - Understanding the Bigger Picture
sponsored by One Identity
VIDEO: In this on-demand webcast, join two IAM experts, Martin Kuppinger and Jackson Shaw, as they talk about the evolution of the Privilege Management market and where the market is moving to.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: In nearly every recent high-profile breach, lapses in privileged account management has been exploited. Learn how human approval can prevent hackers from accessing your privileged accounts.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

One Identity

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

OneLogin

Where to Invest Next: Guidance for Maturing Cyber Defenses
sponsored by CrowdStrike
WHITE PAPER: Take a look at the security staffing, processes and technologies that are common to most mature and maturing organizations.
Posted: 16 May 2018 | Published: 16 May 2018

CrowdStrike

Want Security in the Cloud? Look to Identity First
sponsored by Okta
VIDEO: Join this webcast to discover why modern security starts with identity first and how it can help overcome your cloud frustrations.
Posted: 29 Aug 2018 | Premiered: 29 Aug 2018

Okta

Four Myths About Credential Phishing You Can't Ignore
sponsored by Okta
WHITE PAPER: Successful phishing prevention starts with placing identity at the center of your security strategy. In this white paper, find out why phishing can be more dangerous to organizations than a malware attack, common misconceptions, and 4 myths about credential phishing you can't ignore.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Okta

Strong Authentication Across the Enterprise
sponsored by Okta
VIDEO: As organizations and workplaces evolve, less control is exercised over devices, services, and networks, leading to a gap with traditional security tools. Tune into this webinar for a look at how your organization can gain strong authentication across the enterprise.
Posted: 27 Aug 2018 | Premiered: 27 Aug 2018

Okta

How to Create Marketing Reports Your Boss Actually Cares About
sponsored by SearchSecurity.com
RESOURCE: Have you ever heard the quote "Those who do not learn history are doomed to repeat it."? Reports and analysis are a business' way of learning history. In this 33-page guide learn how to create detailed marketing reports that provide you with 3 essential ingredients for effective reporting insights.
Posted: 18 Jun 2018 | Published: 21 Jun 2018

SearchSecurity.com

Build vs Buy: Dynamic Authorization Solutions
sponsored by Axiomatics
WHITE PAPER: Download this review, for an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

Axiomatics

The Changing Face of Privileged Access Management
sponsored by One Identity
VIDEO: Hear from Kelly Hardy and Tyler Reese from One Identity about the importance of privilege access management (PAM) and how you can maintain frictionless security for your organization.
Posted: 18 May 2018 | Premiered: 15 May 2018

One Identity
1 - 25 of 540 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement