IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 576 Matches Previous Page  |  Next Page
Is Your Software Simple? Assess How Well the PAM Software You Choose Supports Your Goals
sponsored by Thycotic
RESOURCE: Is the Privileged Access Management (PAM) software you chose right for your business? Take this simple test to find out.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Thycotic

The Total Economic Impactâ„¢ of the Auth0 Identity Platform
sponsored by Auth0
ANALYST REPORT: Download this Forrester TEI report to better understand the benefits, costs, and risks associated with the AuthO identity platform.
Posted: 05 Oct 2018 | Published: 31 Oct 2017

Auth0

The Journey to IAM Success
sponsored by One Identity
EBOOK: Read this insightful overview of IAM-project strategy from organizations that have made the journey to IAM success. Discover their recommendations for planning and executing your IAM project.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

One Identity

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
RESOURCE: Discover the importance of identity governance and how you can effectively manage it while taking account of complexity, compliance and limited IT resources.
Posted: 01 Oct 2018 | Published: 31 Dec 2017

One Identity

How to Protect Privileged Accounts with an Incident Response Plan
sponsored by Thycotic
RESOURCE: Today, cybercriminals can create a blueprint of the entire network and operations. Discover the telltale indicators you're under attack and the plans you need to have in place to protect your privileged accounts.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Thycotic

Protecting and Monitoring Access to a State's Systems
sponsored by One Identity
CASE STUDY: Learn how this state improves security, efficiency, and insight into who accesses which systems by replacing 18 IAM systems with a comprehensive platform from One Identity.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Building a Smart City Starts with Security
sponsored by One Identity
CASE STUDY: Smart-city technologies support exciting innovations while improving quality of life for citizens. But, with more sensors collecting data in the field, comes greater security risks. Find out how one city was able to develop their smart capabilities while mitigating security risks.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

One Identity

Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk
sponsored by One Identity
VIDEO: In this webinar, take a look at the top 5 ways for analyzing account entitlements and learn how areas of risk can be identified before a user (or cybercriminal) can abuse their access.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

The Future of Privilege Management - Understanding the Bigger Picture
sponsored by One Identity
VIDEO: In this on-demand webcast, join two IAM experts, Martin Kuppinger and Jackson Shaw, as they talk about the evolution of the Privilege Management market and where the market is moving to.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: In nearly every recent high-profile breach, lapses in privileged account management has been exploited. Learn how human approval can prevent hackers from accessing your privileged accounts.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

One Identity

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

OneLogin

Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 20 Apr 2018 | Published: 16 Aug 2017

Gemalto

Want Security in the Cloud? Look to Identity First
sponsored by Okta
VIDEO: Join this webcast to discover why modern security starts with identity first and how it can help overcome your cloud frustrations.
Posted: 29 Aug 2018 | Premiered: 29 Aug 2018

Okta

Four Myths About Credential Phishing You Can't Ignore
sponsored by Okta
WHITE PAPER: Successful phishing prevention starts with placing identity at the center of your security strategy. In this white paper, find out why phishing can be more dangerous to organizations than a malware attack, common misconceptions, and 4 myths about credential phishing you can't ignore.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Okta

Strong Authentication Across the Enterprise
sponsored by Okta
VIDEO: As organizations and workplaces evolve, less control is exercised over devices, services, and networks, leading to a gap with traditional security tools. Tune into this webinar for a look at how your organization can gain strong authentication across the enterprise.
Posted: 27 Aug 2018 | Premiered: 27 Aug 2018

Okta

Report – Market Guide for Privileged Access Security Management
sponsored by CA Technologies
ANALYST REPORT: In Gartner market guide for privileged access security management, learn about 24 vendors in this competitive and rapidly maturing market.
Posted: 26 Jul 2018 | Published: 22 Aug 2017

CA Technologies

Protect Your Mainframe from the Inside Out
sponsored by CA Technologies
RESOURCE: 77% of data breaches come from internal sources, according to the Ponemon Institute. While it would be nice to trust your employees with your mainframe of data, this is not a wise decision. Download this resource to discover how an access management system can protect your mainframe from internal data breaches.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

How to Create Marketing Reports Your Boss Actually Cares About
sponsored by SearchSecurity.com
RESOURCE: Have you ever heard the quote "Those who do not learn history are doomed to repeat it."? Reports and analysis are a business' way of learning history. In this 33-page guide learn how to create detailed marketing reports that provide you with 3 essential ingredients for effective reporting insights.
Posted: 18 Jun 2018 | Published: 21 Jun 2018

SearchSecurity.com

Build vs Buy: Dynamic Authorization Solutions
sponsored by Axiomatics
WHITE PAPER: Download this review, for an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

Axiomatics

The Changing Face of Privileged Access Management
sponsored by One Identity
VIDEO: Hear from Kelly Hardy and Tyler Reese from One Identity about the importance of privilege access management (PAM) and how you can maintain frictionless security for your organization.
Posted: 18 May 2018 | Premiered: 15 May 2018

One Identity

Where to Invest Next: Guidance for Maturing Cyber Defenses
sponsored by CrowdStrike
WHITE PAPER: Take a look at the security staffing, processes and technologies that are common to most mature and maturing organizations.
Posted: 16 May 2018 | Published: 16 May 2018

CrowdStrike

Identity Analytics: A More Comprehensive Defense in the Battle to Reduce Risk and Enhance Security
sponsored by One Identity
RESOURCE: This resource focuses on "entitlement bloats" that may be putting your organization at risk for undetectable bad actors and threats. Learn how to reduce your attack surface by eliminating unnecessary or dormant entitlements before someone can abuse or exploit them.
Posted: 11 May 2018 | Published: 29 Dec 2017

One Identity

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR

Keep School Districts Safe From Hackers and Ransomware
sponsored by Cisco Umbrella
RESOURCE: How can school districts protect against ransomware? This resource offers a general ransomware protection strategy for school districts, which accommodates individual requirements and protects against advanced threats.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Cisco Umbrella
1 - 25 of 576 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement