IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed   
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 

Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Access Rights Reports
1 - 25 of 149 Matches Previous Page  |  Next Page
Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 01 Jun 2020 | Published: 02 Jun 2020

ComputerWeekly.com

Fuze: Unified Communications Security
sponsored by Fuze
WHITE PAPER: Security and privacy requirements are extremely important when it comes to business communications. In this white paper, learn how a defense-in-depth approach is employed across the Fuze platform whereby multiple layers of security work together to deliver reliable service in a trusted environment.
Posted: 21 May 2020 | Published: 21 May 2020

Fuze

To Enable Zero Trust, Rethink Your Firewall Strategy
sponsored by VMware
ANALYST REPORT: IT organizations are spending more to secure their networks however, these investments are not always paying off. To better understand the challenges that businesses are facing in securing their internal network’s east-west traffic, VMware commissioned Forrester Consulting to conduct a survey. Download this report to explore key findings.
Posted: 20 May 2020 | Published: 29 Feb 2020

VMware

Top Privileged Access Management Use Cases
sponsored by CyberArk Software, Inc
RESOURCE: Learn how to stop attackers by managing privileged access throughout your business with the 6 use cases in this infographic.
Posted: 15 May 2020 | Published: 15 May 2020

CyberArk Software, Inc

Zero-Trust in Practice
sponsored by Gigamon
WEBCAST: In reality, a Zero Trust architecture goes beyond “trust no one” and “build micro-perimeters around your data”, and requires organizations define their own framework, policies and practices. As a result, no two Zero Trust implementations are alike. Download this webcast to learn more.
Posted: 28 Apr 2020 | Premiered: Apr 28, 2020

Gigamon

Secure Transformation: Replacing Remote Access VPN with Prisma Access
sponsored by Palo Alto Networks
WHITE PAPER: Remote access VPN has been an enterprise network staple for years; however, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. In this white paper, learn about the limitations of VPNs and how Prisma Access can help provide secure access to all applications.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Palo Alto Networks

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
WHITE PAPER: The rapid evolution of IT has changed the face of the network perimeter. Devices are proliferating more quickly than most organizations can keep up. The result is an incredibly complex network that introduces significant business risk. In this white paper, learn how next-generation firewalls can help reduce this risk.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Palo Alto Networks

Using IAM and PAM to Enable and Secure Remote Work During the COVID-19 Lockdown
sponsored by Hitachi ID
WHITE PAPER: In this document, learn how identity and access management (IAM) and privileged access management (PAM) systems can help with some of the security challenges created by the current work from home climate.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

Hitachi ID

Business Continuity – Are You Putting Your Company at Risk with RDP?
sponsored by PortSys
RESOURCE: RDP has been a favorite target of hackers for a long time, even before this pandemic. Many organizations may think that their default RDP security methods are good enough. But most RDP deployments don’t even incorporate fundamental security features such as 2FA. Learn how Total Access Control (TAC) can keep users more secure in this WFH world.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

PortSys

Magic Quadrant for Access Management
sponsored by Ping Identity Corporation
ANALYST REPORT: Dive into this Gartner Magic Quadrant for Access Management to see how different vendors in the space stack up.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Ping Identity Corporation

Access Policy Manager
sponsored by F5 Networks
DATA SHEET: Download this overview to learn about all the benefits of F5’s Access Policy Manager (APM).
Posted: 06 Apr 2020 | Published: 06 Apr 2020

F5 Networks

Work from Anywhere for Everyone
sponsored by Cato Networks
WHITE PAPER: The coronavirus outbreak has forced many organizations to move some or all of their employees to work from home. This unforeseen set of events caught many organizations off guard. In this white paper, learn how SASE can help organizations to support continuous remote access for all employees.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Cato Networks

Big-IP Access Policy Manager
sponsored by F5 Networks
WHITE PAPER: Learn how F5 Big-IP Access Policy Manager delivers unified global access control for your users, devices, applications, and APIs.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

F5 Networks

The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)
sponsored by Cato Networks
WHITE PAPER: Networking and security are slowing down the business as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cato Networks

Ultimate Guide to Customer IAM
sponsored by Ping Identity Corporation
EBOOK: Understanding the opportunities that CIAM brings, how it’s different than enterprise IAM and how to choose and implement a CIAM solution may seem like a daunting task. This guide will put you on the right path to selecting the best CIAM solution for your enterprise.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Ping Identity Corporation

Finds Cost- and Time-Savings with IdentityNow
sponsored by SailPoint Technologies
CASE STUDY: Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

SailPoint Technologies

How to Know It’s Time to Change Your Identity Vendor
sponsored by SailPoint Technologies
WHITE PAPER: Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

SailPoint Technologies

4 Ways SailPoint Predictive Identity Puts You in Control
sponsored by SailPoint Technologies
WHITE PAPER: As digital transformation continues to reshape today’s modern enterprise, it is vital that organizations keep focus on protecting and securing their data, no matter where it resides. In this white paper, learn 4 key ways that SailPoint Predictive Identity can help your organization by putting you in control.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Creating an Identity-Aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

Coronavirus: How Ready Are You for Remote Access?
sponsored by PortSys
RESOURCE: Coronavirus is already demonstrating the power it can have to upset the interconnectedness of our business world. With the number of Coronavirus victims worldwide rapidly growing, many businesses will need to support employees who work from home. In this blog post, learn how your organization can take a secure approach to remote access.
Posted: 11 Mar 2020 | Published: 09 Mar 2020

PortSys

Adopting a Zero-Trust Approach Reduces Risk and Lets Your Enterprise Thrive
sponsored by BT
WHITE PAPER: Attackers are constantly looking for weaknesses to exploit — and with cloud and hosted services, these weak points can lie outside your network perimeter. In this white paper, learn why organizations are increasingly taking a zero-trust approach, focusing on where the gaps are and how people might exploit them.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

BT

ACLs Are Not Enough - Achieving Zero Trust by Extending Least Privilege
sponsored by ShieldX
VIDEO: In this video, see how the application of ShieldX Least Privilege Access Control is extended to network Layer 7 to achieve zero trust security.
Posted: 14 Feb 2020 | Premiered: 14 Feb 2020

ShieldX

Remove Standing Privileges Through a Just-in-Time PAM Approach
sponsored by Centrify Corporation
ANALYST REPORT: Privileged access carries significant risk, and even with PAM tools in place, the residual risk of users with standing privileges remains high. Security and risk management leaders must implement a zero standing privileges strategy through a just-in-time model. Download this report to learn how effective PAM requires enforcing least privilege.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Centrify Corporation

Leading Change for CISOs: Embedding a Secure Culture
sponsored by RSA Conference
WEBCAST: There was a time when cybersecurity was strictly a concern for IT departments, but those days are long gone. In today’s far-reaching threat environment, cybersecurity needs to be baked into the very fabric of a company. In this webcast, learn how organizations can leverage organizational change models for an all-inclusive culture of security.
Posted: 21 Jan 2020 | Premiered: Oct 2, 2019

RSA Conference

The Future of Network Security Is in the Cloud
sponsored by Apcela
ANALYST REPORT: Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.
Posted: 11 Nov 2019 | Published: 30 Aug 2019

Apcela
1 - 25 of 149 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info