IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed   
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 

Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Access Rights Reports
1 - 25 of 138 Matches Previous Page  |  Next Page
Doing Identity Access Right
sponsored by HelpSystems
WHITE PAPER: In a world of corporate hacks and ransomware, keeping your data under digital lock and key is essential. But so is allowing your employees to use it to do their best work. In this white paper, explore common access risks and how Identity Governance and Administration (IGA) can help your organization combat these risks.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

HelpSystems

Intelligent Identity And Access Management
sponsored by HelpSystems
WHITE PAPER: Providing Identity and Access Management (IAM) is a huge task; therefore, organizations are likely to face many challenges. Unfortunately, the environments that IAM systems support are often subject to attacks. In this white paper, learn how to leverage Intelligent IAM to help keep your organization's identity and accounts safe and secure.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

HelpSystems

Securing Transportation Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.
Posted: 16 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

The Risk Initiative: Building a Business Case with Mitigation ROI
sponsored by Cyber-Ark Software
ANALYST REPORT: CyberArk launched a multi-part research project "The Risk Initiative: Building a Business Case with Mitigation ROI" which is designed to investigate how cybersecurity professionals can mature their programs to move towards ROI-centric decision-making. Download this research report to explore key findings.
Posted: 15 Jul 2019 | Published: 28 Feb 2019

Cyber-Ark Software

Where Security Accountability Stops and Starts In the Public Cloud
sponsored by Cyber-Ark Software
WHITE PAPER: Whether in the cloud or on-premises, credentials are vital to secure and manage. It is especially important to protect privileged credentials because they allow the escalation of privileges within the cloud infrastructure. In this white paper, learn why a privileged access security strategy is key to protecting critical data in the cloud.
Posted: 15 Jul 2019 | Published: 30 Jun 2019

Cyber-Ark Software

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

The Cost of Credential Stuffing
sponsored by Akamai
ANALYST REPORT: Credential stuffing attacks can cause loss of customers and involvement of IT security that can result in an average cost of $1.2 million, according a Ponemon Institute survey. To gain a better understanding of the cost to prevent, detect and remediate credential stuffing attacks download this Ponemon Institute study.
Posted: 11 Jul 2019 | Published: 31 Oct 2018

Akamai

Privacy: Data Protection and Identity Management
sponsored by Micro Focus
WEBCAST: To help enterprises meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. In this webcast, Nathan Turajski, Director of Product Marketing at Micro Focus provides an overview of their Data Protection and Identity Management solution.
Posted: 10 Jul 2019 | Premiered: Feb 28, 2019

Micro Focus

Securing the Grid Why Privileged Access Security is Key to Protecting Critical Energy & Utilities Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: One of the largest security vulnerabilities faced by companies in the energy and utilities sector is privileged accounts, and the access they provide. In this white paper, learn how energy and utilities organizations can proactively reduce the risk posed by privileged access.
Posted: 10 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Robotic Process Automation (RPA): Solving Key Security Challenges in RPA Deployments
sponsored by Cyber-Ark Software
WHITE PAPER: Robotic process automation (RPA) has the potential to deliver huge benefits to organizations; however, it is easy to overlook the IT security risks that RPA deployment can bring. In this white paper, learn how to mitigate those IT security risks. Also, explore typical approaches to RPA deployment and the benefits it offers.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Cyber-Ark Software

How the University of Sunderland Simplified and Enables Mobility and BYOD
sponsored by Ignition Technology Ltd
CASE STUDY: The University of Sunderland was looking for a platform that assured users are who they say they are while still being incredibly easy to use for all members of the university community. In this case study, learn how Duo allowed the university to do this while reducing the impact of cyberattacks.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Ignition Technology Ltd

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by Cyber-Ark Software
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Cyber-Ark Software

The Hidden Threat in Your Organization: Preventing Privileged User Abuse in Salesforce
sponsored by FairWarning
WHITE PAPER: Privileged Salesforce users are necessary to every organization however, with the ability to make nearly unlimited changes; they place your organization at tremendous risk. In this white paper, explore 4 best practices for preventing privileged user abuse in Salesforce.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

FairWarning

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
RESOURCE: In this video transcript, two security experts from One Identity talk about how Privileged Access Management is not just about securing passwords and how there's much more that needs to be done to keep your enterprise safe.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

One Identity

Privileged Account Governance and Incident Response
sponsored by One Identity
RESOURCE: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this video transcript, Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

One Identity

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
WEBCAST: In this webinar, listen to two security experts from One Identity talk about how Privileged Access Management is not just about securing passwords and how there's much more that needs to be done to keep your enterprise safe.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

CyberArk PAS Assessment Tool
sponsored by CyberArk Software, Inc
PRODUCT OVERVIEW: The commonality in most data breaches and cyberattacks is the exploitation of privileged accounts, credentials and access keys. In this solution brief, learn how CyberArk's Privileged Access Security Assessment Tool can help you evaluate your current privileged access security risk and vulnerabilities.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

CyberArk Software, Inc

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
PODCAST: In this podcast episode with two IAM experts from One Identity, learn more about privileged accounts and how you can block bad actors from accessing your company's data.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Webcast: Solutions for Privileged Account Resilience
sponsored by One Identity
WEBCAST: Tune into this informative webcast with two security experts from One Identity. They discuss solutions for Privileged Account Resilience and how to overcome the challenges that come with them.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Podcast: Privileged Account Governance and Incident Response
sponsored by One Identity
PODCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Privileged Account Governance and Incident Response
sponsored by One Identity
WEBCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this webcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Onfido

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 03 Jun 2019 | Published: 30 May 2019

Onfido

How to Improve Your Mobile Authentication Practices
sponsored by Onfido
EGUIDE: The most common mobile authentication methods include a variety of risks which could leave your mobile devices open for hackers to roam freely. In this e-guide learn why a strong mobile authentication strategy should include a biometric factor, and why IT should consider implementing a multifactor authentication process.
Posted: 31 May 2019 | Published: 29 May 2019

Onfido
1 - 25 of 138 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement