IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >   Access Control  >  

Access Rights

RSS Feed   
ALSO CALLED: Privileges
DEFINITION: In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage. Generally, a system administrator or, in the case of network resources such as access to a particular device, a network administrator assigns privileges to users. System  … 

Access Rights definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Access Rights Reports
1 - 25 of 123 Matches Previous Page  |  Next Page
Twitter Phone Spear Phishing Attack
sponsored by Lookout
WHITE PAPER: On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

Lookout

An overview of IBM’s identity & access management services
sponsored by IBM
ANALYST REPORT: This Forrester study, commissioned by IBM, provides an unbiased look at the potential benefits, costs and risk areas of IBM’s Identity and Access Management (IAM) services. Download the report to unlock the key findings from the study and explore a use case that demonstrates the potential of adopting IBM’s IAM services
Posted: 15 Sep 2020 | Published: 15 Sep 2020

IBM

Strong Customer Authentication (SCA)
sponsored by Vonage
WHITE PAPER: In recent years, Europe has ramped up on regulations concerning payment services and payment authentication. Legislation requires payment service providers (PSPs) to deliver strong customer authentication (SCA). Jump into this white paper to learn how to remain compliant without compromise.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Vonage

DTEX and the Insider Threat Kill Chain
sponsored by Dtex
EBOOK: With insider threats, you must ask yourself, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

Dtex

Predictive Identity: A Key Enabler for a Successful Merger or Acquisition
sponsored by SailPoint Technologies
EBOOK: This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

Maintain Business Continuity with Aruba's Remote Access Solutions
sponsored by Aruba Networks
DATA SHEET: More people than ever before are now working remotely. But everyone still needs secure, reliable access to systems and applications, no matter where they are. How do you open up your network and still keep data secure? In this brief, learn how Aruba’s remote access solutions can help.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks

Five Ways to Strengthen AWS Managed Services Security With CyberArk
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover 5 ways CyberArk can help reduce privileged access security risk, improve visibility and control, and simplify operations
Posted: 27 Jul 2020 | Published: 27 Jul 2020

CyberArk Software, Inc

IdentityNow Short Video: Separation of Duties
sponsored by SailPoint Technologies
VIDEO: Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

SailPoint Technologies

Sailpoint Final
sponsored by SailPoint Technologies
VIDEO: When a company has over 10,000 employees, over 100 applications, and different privileges within those applications, there’s a lot to protect. That’s why SailPoint simplifies identity management for enterprises with automation. View this short video to learn more.
Posted: 20 Jul 2020 | Premiered: 20 Jul 2020

SailPoint Technologies

Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

Executive Summary 2020 Thales Access Management Index
sponsored by Thales
RESEARCH CONTENT: The 2020 Access Management Index explores access management practices within businesses and the use and importance of two-factor authentication, smart SSO and cloud access management tools. Read on to uncover the key findings.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Thales

Businesses at Work (from Home) 2020 Edition
sponsored by Okta
ANALYST REPORT: Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Customer Identity and Access Management - Deciding Between Build vs Buy
sponsored by Akamai Technologies
WEBCAST: This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.
Posted: 22 Jun 2020 | Premiered: Jun 22, 2020

Akamai Technologies

Aruba ESP With Zero Trust Security: Security for the Edge
sponsored by Aruba Networks
DATA SHEET: In this brief, learn how Aruba ESP with Zero Trust Security can help improve an organization’s overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Aruba Networks

Security Access Controls Over Identities Must Be Priority
sponsored by SearchSecurity.com
EGUIDE: No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

SearchSecurity.com

How to Achieve Optimal Internal Segmentation with FortiGate NGFWs and the Fortinet Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: To protect their digital assets, network engineering and operations leaders need to go beyond perimeter-based network security to implement a defense-in-depth strategy with Internal Segmentation. In this white paper, learn how Fortinet FortiGate NGFWs can help to enable Internal Segmentation.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Fortinet, Inc.

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 01 Jun 2020 | Published: 02 Jun 2020

ComputerWeekly.com

Fuze: Unified Communications Security
sponsored by Fuze
WHITE PAPER: Security and privacy requirements are extremely important when it comes to business communications. In this white paper, learn how a defense-in-depth approach is employed across the Fuze platform whereby multiple layers of security work together to deliver reliable service in a trusted environment.
Posted: 21 May 2020 | Published: 21 May 2020

Fuze

To Enable Zero Trust, Rethink Your Firewall Strategy
sponsored by VMware
ANALYST REPORT: IT organizations are spending more to secure their networks however, these investments are not always paying off. To better understand the challenges that businesses are facing in securing their internal network’s east-west traffic, VMware commissioned Forrester Consulting to conduct a survey. Download this report to explore key findings.
Posted: 20 May 2020 | Published: 29 Feb 2020

VMware

Secure Transformation: Replacing Remote Access VPN with Prisma Access
sponsored by Palo Alto Networks
WHITE PAPER: Remote access VPN has been an enterprise network staple for years; however, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. In this white paper, learn about the limitations of VPNs and how Prisma Access can help provide secure access to all applications.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

Palo Alto Networks

Using IAM and PAM to Enable and Secure Remote Work During the COVID-19 Lockdown
sponsored by Hitachi ID
WHITE PAPER: In this document, learn how identity and access management (IAM) and privileged access management (PAM) systems can help with some of the security challenges created by the current work from home climate.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

Hitachi ID

Work from Anywhere for Everyone
sponsored by Cato Networks
WHITE PAPER: The coronavirus outbreak has forced many organizations to move some or all of their employees to work from home. This unforeseen set of events caught many organizations off guard. In this white paper, learn how SASE can help organizations to support continuous remote access for all employees.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Cato Networks

The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)
sponsored by Cato Networks
WHITE PAPER: Networking and security are slowing down the business as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cato Networks

Finds Cost- and Time-Savings with IdentityNow
sponsored by SailPoint Technologies
CASE STUDY: Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

SailPoint Technologies

How to Know It’s Time to Change Your Identity Vendor
sponsored by SailPoint Technologies
WHITE PAPER: Changing identity governance vendors can be a difficult decision. But some situations make it almost mandatory to change identity governance vendors. At the end of the day, this is a business decision based on the facts. In this white paper, explore 7 situations which would warrant you to change your identity vendor.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

SailPoint Technologies
1 - 25 of 123 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info