IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 485 Matches Previous Page  |  Next Page
Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

SafeNet Trusted Access: Cloud-based Access Management as a Service
sponsored by Thales
PRODUCT OVERVIEW: While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.
Posted: 27 Mar 2020 | Published: 31 May 2019

Thales

Secure the Cloud: Cloud-Enabled Mobile Workforce
sponsored by Palo Alto Networks
WHITE PAPER: As organizations adopt the cloud, new requirements for protecting mobile users are emerging. In this white paper, learn how Prisma Access can help provide cloud-delivered security infrastructure that makes it possible for your organization to connect users to a cloud gateway, enable secure access to all applications and maintain full visibility.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Palo Alto Networks

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

Unlocking Omni-Channel with Unified Customer Identity
sponsored by Okta
WHITE PAPER: To meet the growing needs of online consumers, organizations have begun to adopt 2 key approaches: customer identity & access management (CIAM), and omni-channel integration. Interested in learning more about this approach? Get started by reading this white paper.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Okta

Alero Intro
sponsored by CyberArk Software, Inc
VIDEO: In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

CyberArk Software, Inc

Customer Identity & Access Management (CIAM)
sponsored by Ping Identity Corporation
WHITE PAPER: Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Ping Identity Corporation

CyberArk Privilege Cloud Whiteboard Video
sponsored by Cyber-Ark Software
VIDEO: Organizations are shifting from traditional perimeter security tools to focusing on controlling and managing access, allowing for remote workers and third parties to securely interact in their network. In this whiteboard video, discover the value of privileged access management programs delivered as SaaS.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

Cyber-Ark Software

A Guide to Verifying Users in Financial Services
sponsored by Vonage
WHITE PAPER: Learn how banks and fintech companies can securely onboard customers at global scale with phone verification.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Vonage

CyberArk Provides Free Subscription to Alero
sponsored by Cyber-Ark Software
RESOURCE: CyberArk is offering qualified customers the use of CyberArk Alero at no cost through the end of May in hopes that it will help ease some of the burden associated with the changing work environment during COVID-19. Read this blog for more information.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Cyber-Ark Software

7 Steps to SSO + MFA to On-Prem Apps
sponsored by Okta
WEBCAST: Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.
Posted: 25 Mar 2020 | Premiered: Mar 25, 2020

Okta

Secure Access to On-prem Apps & Hybrid Cloud Security
sponsored by Okta
DATA SHEET: In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Okta

CA SiteMinder Migration Guide
sponsored by Okta
WHITE PAPER: To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.
Posted: 24 Mar 2020 | Published: 30 Sep 2019

Okta

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

CyberArk Provides Free Subscription to Alero
sponsored by Cyber-Ark Software
RESOURCE: The emergence of COVID-19 has caused sweeping environmental changes amongst organizations doing their part to stop the spread, enabling more employees to work remotely than ever before. To help ease the transition, CyberArk is planning to offer its secure remote access platform at no cost through May. Read on to learn more.
Posted: 24 Mar 2020 | Published: 18 Mar 2020

Cyber-Ark Software

Alero Showcase
sponsored by CyberArk Software, Inc
VIDEO: In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Remote Vendor Access
sponsored by CyberArk Software, Inc
WHITE PAPER: Today’s organizations are heavily reliant on third-party vendors accessing their critical infrastructures. However, this presents an attractive target for hackers. In this white paper, discover how the CyberArk Alero architecture could help you achieve security without the need for VPNs or passwords. Read on to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc

CyberArk Alero Security
sponsored by CyberArk Software, Inc
DATA SHEET: Access management enables organizations to provide the same level of security to users, devices and apps whether they are remote or local. This data sheet takes a closer look at the CyberArk Alero architecture, which combines access management tools into one, unified platform. Read on to discover the features and capabilities of Alero.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

CyberArk Software, Inc

Securely Manage 3rd Party Remote Access to CyberArk
sponsored by Cyber-Ark Software
WEBCAST: Third-party vendor access is a critical component to most business operations today. However, this presents a new vulnerability that cybercriminals look to expose. In this webinar, take a closer look at notable breaches and challenges with existing third-party access security options. Continue to watch the webinar.
Posted: 23 Mar 2020 | Premiered: Mar 23, 2020

Cyber-Ark Software

Securely and Quickly Connect Remote Vendors and Employees to CyberArk.
sponsored by Cyber-Ark Software
RESOURCE: According to a recent CyberArk study, even though a vast majority of organizations rely on third-party vendor access, 72% rank this as one of their top 10 security risk areas. This blog post provides an in-depth look at CyberArk Alero, designed to address this vulnerability. Read on to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Cyber-Ark Software

Access Management Handbook
sponsored by Thales
EBOOK: The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.
Posted: 23 Mar 2020 | Published: 30 Sep 2019

Thales

CyberArk Alero
sponsored by Cyber-Ark Software
DATA SHEET: Today’s modern workforce, consisting of remote employees, mobile devices and distributed networks, requires account access management in order to maintain the safety of the network as perimeters vanish. Download this data sheet to explore the features and benefits of CyberArk’s Alero offering, designed to address privileged access needs.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Cyber-Ark Software

Identity Governance for File Shares
sponsored by SailPoint Technologies
DATA SHEET: Learn how IdentityIQ File Access Manager can help you securely manage access to your sensitive data and files in the cloud and on-premises.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

SailPoint Technologies

Securing Financial Data from Within
sponsored by Trustwave
CASE STUDY: In this case study, discover how a global accounting firm was able equip their IT staff with a point-and-shoot security program that enabled them to audit user access, address misconfigurations and other vulnerabilities. Read on to see the full story.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Trustwave
1 - 25 of 485 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info