IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed   
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 

Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Access Rights Reports
1 - 25 of 184 Matches Previous Page  |  Next Page
7 Considerations for Implementing Zero Trust
sponsored by Banyan Security
RESOURCE: Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Banyan Security

Zero Trust Remote Access Platform
sponsored by Banyan Security
PRODUCT OVERVIEW: Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.
Posted: 05 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Okta + Experian: Identity Proofing Your Enterprise
sponsored by Okta
DATA SHEET: In this data sheet, find out how Okta and Experian work together to offer enterprises multiple layers of security and proofing to verify a user’s identity, and ensure they are entitled to access the information they’re trying to access.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

Newcomer Banyan Tackles Zero Trust with a Mesh-Based Approach to Multi-Cloud Security
sponsored by Banyan Security
ANALYST REPORT: In this 451 Research report, learn about Banyan’s new security offering that focuses on the authorization layer of a zero-trust platform, or what it calls a ‘zero trust continuous authorization framework.’
Posted: 03 Dec 2019 | Published: 03 Dec 2019

Banyan Security

Banyan Security Zero Trust Remote Access Video
sponsored by Banyan Security
VIDEO: In this video, learn about a singular Zero Trust remote access platform that delivers dynamic trust scoring, continuous authorization and granular access enforcement.
Posted: 02 Dec 2019 | Premiered: 02 Dec 2019

Banyan Security

Get Your App Ready for the Global B2B Market
sponsored by Okta
WHITE PAPER: To foster a healthy relationship with enterprise partners and customers, you need to allow those users to use their existing enterprise identities to access your applications or shared resources. In this white paper, learn about 4 ways to integrate your enterprise applications and internal systems with your partners and customers’ identities.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

4 Ways to Improve Customer Experience with a Modern Identity Service
sponsored by Okta
WHITE PAPER: In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

CIS Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 15 Nov 2019 | Published: 31 Dec 2016

Splunk

The Future of Network Security Is in the Cloud
sponsored by Apcela
ANALYST REPORT: Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.
Posted: 11 Nov 2019 | Published: 30 Aug 2019

Apcela

Buyer’s Guide for Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

Cisco Umbrella: Reporting You Can Count On
sponsored by Cisco Umbrella
RESOURCE: Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cisco Umbrella

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

6 Security Checkpoints to Consider Along Your Organization’s Cloud Journey
sponsored by CyberArk Software, Inc
RESOURCE: Whether you’re on a journey to a public, private or hybrid cloud environment, relying on DevOps or leveraging SaaS applications, understanding cloud computing vulnerabilities is critical. In this infographic, discover 6 cloud vulnerabilities and steps for securing them.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

CyberArk Software, Inc

Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

Mobile Fraud Detection: Top 4 Threats to the Mobile Channel
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

2019 True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
ANALYST REPORT: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

Retailers are Creating More Opportunity for Fraudsters
sponsored by LexisNexis® Risk Solutions
RESOURCE: Fraudster are exploiting digital channels and seizing more opportunities across a diverse set of retailers. Learn more about fraud attempts, targets, driving factors, top challenges and recommendations in this infographic.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

A Framework for Cybersecurity and Compliance
sponsored by OneNeck IT
WHITE PAPER: In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

OneNeck IT

Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In
sponsored by LexisNexis® Risk Solutions
RESOURCE: The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

Cybercrime Networks: How Businesses Can Join Forces to Beat Fraudsters
sponsored by LexisNexis® Risk Solutions
RESOURCE: Just because businesses are hardening their defenses against cybercrime, doesn’t mean fraudsters are giving up. Instead, they’re getting smarter — and taking a much more collaborative approach. In this resource, learn how businesses can join together to defend against fraud.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

CyberArk Privilege Cloud Whiteboard Video
sponsored by CyberArk Software, Inc
VIDEO: CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.
Posted: 24 Oct 2019 | Premiered: 24 Oct 2019

CyberArk Software, Inc

True Cost of Fraud Webinar
sponsored by LexisNexis® Risk Solutions
WEBCAST: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.
Posted: 23 Oct 2019 | Premiered: Oct 23, 2019

LexisNexis® Risk Solutions

Pogo Paradox: Is Your Infrastructure Your Worst Enemy?
sponsored by PortSys
RESOURCE: In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.
Posted: 14 Oct 2019 | Published: 15 Sep 2019

PortSys

All Access Is Not Created Equal
sponsored by PortSys
RESOURCE: “Context of Access” involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

The Superpower of “Yes! But…”
sponsored by PortSys
RESOURCE: There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”
Posted: 09 Oct 2019 | Published: 09 Oct 2019

PortSys
1 - 25 of 184 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement