IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed   
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 

Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Access Rights Reports
1 - 25 of 179 Matches Previous Page  |  Next Page
Cybercrime Report Webinar Sept 2019
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, Courtney Austin and Ellie Burns from LexisNexis Risk Solutions explore global insights from the new LexisNexis Risk Solutions Cybercrime Report covering January to June 2019.
Posted: 14 Oct 2019 | Premiered: Oct 14, 2019

LexisNexis Risk Solutions

Pogo Paradox: Is Your Infrastructure Your Worst Enemy?
sponsored by PortSys
RESOURCE: In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.
Posted: 14 Oct 2019 | Published: 15 Sep 2019

PortSys

All Access Is Not Created Equal
sponsored by PortSys
RESOURCE: “Context of Access” involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

The Superpower of “Yes! But…”
sponsored by PortSys
RESOURCE: There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”
Posted: 09 Oct 2019 | Published: 09 Oct 2019

PortSys

Identity Is Not Security – Context Is King
sponsored by PortSys
RESOURCE: Identity is still important to security, but identity alone is NOT security. By binding user credentials with security policies based on the multiple factors within context of access, organizations today can significantly strengthen the protection of their enterprise resources, and ultimately, their bottom line. Read this article to learn more.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

PortSys

Five Reasons to Prioritize Privileged Access Management as-a-Service
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged Access Management (PAM) as-a-Service is becoming a popular method for deploying security solutions for a variety of reasons. Download this white paper for the top 5.
Posted: 03 Oct 2019 | Published: 03 Oct 2019

CyberArk Software, Inc

Improving Lives Around the World through Easier Access to Knowledge
sponsored by PortSys
CASE STUDY: Learn how Research4Life was able to use PortSys Total Access Control to manage access across all programs and make the lives of end users around the world easier.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

PortSys

PortSys Total Access Control Case Study
sponsored by PortSys
RESOURCE: While all companies are concerned about security, those in the financial services industry are especially so. Read this case study to see how a financial services firm used PortSys Total Access Control to address risk-based security for their devices and applications.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Take a Better TAC to Protect RDP
sponsored by PortSys
RESOURCE: Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Making the Business Case for Zero Trust Access
sponsored by PortSys
RESOURCE: Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.
Posted: 27 Sep 2019 | Published: 07 Jun 2019

PortSys

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation
sponsored by PortSys
RESOURCE: Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.
Posted: 27 Sep 2019 | Published: 22 Jul 2019

PortSys

Supporting NERC CIP Compliance
sponsored by Claroty
WHITE PAPER: Electric industry asset owners are subject to mandatory cybersecurity regulations known as the NERC CIP standards. In this white paper, learn how Claroty's fully integrated platform supports entities' compliance efforts while helping to improve the cybersecurity and operational reliability of power generation and transmission systems.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

Delivering Frictionless Security to the Clinical Workflow
sponsored by Imprivata
ANALYST REPORT: Frictionless security is becoming increasingly important in healthcare: security that is well-integrated into clinical workflows and provides the necessary access controls. In this white paper, learn how to simplify the task of achieving frictionless security by using a single provider for access management across the entire clinical workflow.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Imprivata

Identity and Access Management for Healthcare
sponsored by Imprivata
WHITE PAPER: 10 years ago, most health system information technology leaders didn't have Identity and Access Management (IAM) at the top of their priority lists. So, what changed? In this white paper, explore the key areas of healthcare's digital identity lifecycle, important regulations, and top security issues that have led to greater investments in IAM.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

Top Reasons Why Identity Governance Matters for Chief Information Officers
sponsored by Imprivata
WHITE PAPER: Forward-looking CIOs are turning to healthcare-specific technologies to automate identity governance functions, reduce operating expenses, and free up staff to focus on business-critical tasks. In this white paper, learn how Imprivata Identity Governance can help address Identity and Access Management challenges for CIOs.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

Securing Transportation Infrastructure
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities for transportation organizations today. In this white paper, learn how transit or infrastructure organizations can secure their privileged accounts, credentials and secrets.
Posted: 16 Sep 2019 | Published: 30 Apr 2019

Cyber-Ark Software

Rethinking Third-party Cyber Risk Management
sponsored by CyberGRX
WHITE PAPER: In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

CyberArk Privilege Cloud Reduces Risk with PAM SaaS
sponsored by CyberArk Software, Inc
RESOURCE: Creating and executing a successful privileged access security program can seem like a daunting task. Privileged access is pervasive throughout the enterprise and can be difficult to manage without the right tools. In this blog, learn how CyberArk Privilege Cloud can help organizations start their privileged access management journey.
Posted: 10 Sep 2019 | Published: 01 Aug 2019

CyberArk Software, Inc

Office 365 Anti-Phishing Tools
sponsored by Cisco Umbrella
EGUIDE: Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.
Posted: 06 Sep 2019 | Published: 04 Sep 2019

Cisco Umbrella

SailPoint Predictive Identity™: The Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
PRODUCT OVERVIEW: Digital transformation has opened up opportunities for greater growth but, it's also introducing challenges. Digital transformation means more users, more apps, and more data – and if not properly addressed, also means more risk. In this solution brief, learn how organizations can address this risk with the help of SailPoint Predictive Identity.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

SailPoint Technologies

EMEA Cybercrime Report 2019
sponsored by LexisNexis Risk Solutions
ANALYST REPORT: Download the LexisNexis Risk Solutions EMEA Cybercrime Report to discover key findings based on cybercrime attacks detected by the ThreatMetrix Digital Identity Network from January – March 2019.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

LexisNexis Risk Solutions

EMEA Cybercrime Report 2019 - Key Findings
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, Courtney Austin and Ellie Burns from LexisNexis Risk Solutions discuss key findings from the 2019 EMEA Cybercrime Report. Download the webinar to find out what is fueling cybercrime in the EMEA region.
Posted: 05 Sep 2019 | Premiered: Jul 31, 2019

LexisNexis Risk Solutions

Protecting Your Organization from Password Breaches
sponsored by OneLogin
EGUIDE: With a large number of password breaches happening, enterprises should look into methods for protecting their resources. Although there are many methods for protecting passwords and accounts, finding the right one can be challenging. In this e-guide, explore a number of tools organizations can use to help secure their passwords and accounts.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

OneLogin

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation
1 - 25 of 179 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement