IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Access Control

RSS Feed   
DEFINITION: To seize is to take or wrest control of something that you did not previously control. In programming, for example, an operating system may seize or take control of some memory that is in use by an application because they have used it too long and it is needed by other applications that are running concurrently. A seizure may be permanent or temporary.Also see lock.
Access Control Reports
1 - 25 of 567 Matches Previous Page  |  Next Page
Top 10 Reasons for Migrating to CipherTrust Manager for KeySecure Customers
sponsored by Thales
WHITE PAPER: For years, the KeySecure platform has equipped organizations with key management and data protection capabilities across their organizations. The following white paper highlights 10 reasons why KeySecure users should switch over to Thales’s next-gen CipherTrust manager – read on to learn more.
Posted: 26 Oct 2020 | Published: 30 Jun 2020

Thales

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER: Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Quest

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of Mimecast’s email authentication offering.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Endpoint Security: Protecting Your Business Wherever It Goes
sponsored by Dell SecureWorks
WHITE PAPER: The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

New Account Fraud: Uncovering the Tools And Tactics Of A New Breed Of Scams
sponsored by Buguroo
WHITE PAPER: To enhance customer experience, banks are closing branches in favor of digital services to meet the growing demand of tech-savvy users. A big risk of this change is new account fraud, which is a cyber scam where bad actors use stolen or synthetic identities to open accounts and borrow money. Read this white paper to get a closer look.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Buguroo

The New Normal of Securing Remote Workers
sponsored by Palo Alto Networks
WEBCAST: 67% of organizations plan on keeping work from home policies in place long-term or permanently, according to a recent survey. As a result, organizations need to turn their focus to building and scaling a work-from-anywhere workforce. In this webcast, uncover best practices for enabling a work-from-anywhere workforce.
Posted: 16 Oct 2020 | Premiered: Oct 16, 2020

Palo Alto Networks

The Future of Network Security Is in the Cloud
sponsored by Palo Alto Networks
ANALYST REPORT: Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.
Posted: 15 Oct 2020 | Published: 30 Aug 2019

Palo Alto Networks

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Prisma Access BP Webinar
sponsored by Palo Alto Networks
WEBCAST: Due to COVID-19, the notion of remote access has evolved and expanded to allow students to remotely connect to classes, doctors to securely connect to their patients and remote workers to connect to the applications and resources they need. In this webcast, learn more about how secure remote access is evolving and how a SASE approach can help.
Posted: 14 Oct 2020 | Premiered: Oct 14, 2020

Palo Alto Networks

Aruba Clearpass Network Access Control
sponsored by TechData
DATA SHEET: In this white paper, learn how mobility and IoT are changing how organizations approach network access control (NAC) and how switching to security tools like Aruba Clearpass can help detect threats before damage occurs.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

TechData

What is Okta Access Gateway
sponsored by Okta
VIDEO: Securely connecting users to applications isn’t a new problem. Historically, organizations opted for on-premise single sign-on (SSO) tools to address this. However, SSO tools are unable to meet the security and scalability needs of today’s hybrid IT environments. Watch this video to see how Okta addresses this need.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Okta

Managing Identity So You Can Scale
sponsored by Okta
WHITE PAPER: Today’s users expect an experience that is not only frictionless and personalized, but also secure. To meet this demand, organizations are turning to customer identity and access management (CIAM) tools. Read this white paper to learn more about Okta’s CIAM offering and how it’s benefitted some of their key partners.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Okta

Three Ways PKI Can Help Secure the Remote Workforce
sponsored by Sectigo
EBOOK: IT departments have found themselves under pressure to scale networks to support long-term remote work. With this scale comes a slew of network vulnerabilities that traditional identity management strategies may not be able to handle. View this in-depth e-book to learn 3 ways public key infrastructure can help protect remote workers.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

PKI Offers Better Identity Security Than Typical MFA Solutions
sponsored by Sectigo
RESOURCE: Identity is the new perimeter – how can you best protect the identities of your people, devices, and data? MFA can be effective, but it still leaves vulnerabilities that you must account for. View this infographic to learn why public key infrastructure may provide more robust security than typical MFA.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Sectigo

SASE: A How to Guide
sponsored by Apcela
WEBCAST: In this webcast, join Mark Casey and Kunal Thakkar of Apcela as they show how enterprises are creating a Secure Access Service Edge (SASE) network security architecture built for the cloud.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Apcela

Benefits of Migrating from Web Access Management (WAM)
sponsored by Okta
PRODUCT OVERVIEW: For organizations favoring hybrid IT environments, web access management (WAM) tools have historically offered effective security. However, as these organizations grew, WAM began to show signs of cracking. Read this white paper to learn more about the disadvantages of WAM and how to secure hybrid IT environments.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Okta

4 Actions IT Can Take to Ensure Business Continuity Using PKI Automation
sponsored by Sectigo
EBOOK: Managing risks has never been a greater challenge for IT professionals, and this is especially true when considering identity management. With an increasing number of angles for bad actors to steal passwords, it may be time for an evolution in authentication. Jump into this e-book to learn about public key infrastructure.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

The Password-less Enterprise: Using PKI To Replace Passwords For Identity And Access
sponsored by Sectigo
WHITE PAPER: Today’s IT security teams need to be able to authenticate identities throughout the enterprise —whether those identities belong to humans, devices, data or applications. Unfortunately, passwords are either too vulnerable or just plain forgotten (or misused). Read this white paper to learn about public key infrastructure, a password-less approach.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

How Visibility Unlocks Zero-Disruption Microsegmentation
sponsored by ColorTokens
WEBCAST: Microsegmentation is gaining popularity amongst security architects for its ability to enhance agility, incident response, compliance readiness and more. Watch this webinar to learn more about the benefits and possibilities of microsegmentation from 2 distinguished experts.
Posted: 08 Oct 2020 | Premiered: Jul 29, 2020

ColorTokens

Path to PCI-DSS 4.0: Simplifying Compliance and Securing Cardholder Data
sponsored by ColorTokens
VIDEO: PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.
Posted: 07 Oct 2020 | Premiered: 12 Jun 2020

ColorTokens

Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

Secure, Connected Digital Workplace
sponsored by TATA Communications
WHITE PAPER: The world of IT has undergone more transformation in the past six months than many could have predicted, but that doesn’t mean that organizations will be smooth-sailing when the pandemic is over. Businesses must continue to plan for the unexpected. Read this white paper to understand what to prioritize when it comes to post-COVID operations.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

TATA Communications

Securing the Digital Workplace
sponsored by TATA Communications
DATA SHEET: Organizations are searching for ways to ensure secure remote access for identity, devices, apps, data and networks. The security perimeter has changed, and there are still many complex challenges that organizations need to overcome. Take control – view this data sheet to see how Tata Communications may be able to assist.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

TATA Communications
1 - 25 of 567 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info