IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
1 - 25 of 222 Matches Previous Page  |  Next Page
Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

How IT Administrators Are Tackling Active Directory and Security
sponsored by Zoho
RESOURCE: ManageEngine conducted a global survey to identify the various Active Directory (AD) and IT security issues admins face – and the results were shocking. The stats ManageEngine saw broke certain assumptions they held about how admins went about tackling various issues. In this infographic, explore the stats.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

How to Keep up with the Shifting Landscape of Password Attacks
sponsored by Zoho
WHITE PAPER: Hackers are evolving, and apart from implementing technology to help avoid cyberthreats, personal awareness plays a big role in defending against the mechanisms cybercriminals use to steal credentials. In this white paper, explore password theft methods used by hackers, and learn how simple tweaks can reduce the risk of a password compromise.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

The IT Director's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 14 Aug 2019 | Published: 31 May 2019

Ping Identity Corporation

Zero Trust Access Video
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 13 Aug 2019 | Premiered: 13 Aug 2019

PortSys

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

PortSys

Zero Trust Access Today's IT Security Falls Short
sponsored by PortSys
RESOURCE: 78% of organizations were affected by successful cyberattacks, according to the 2019 CyberEdge Group Cybersecurity Report. As a result, zero trust is a top budget focus for many organizations. In this infographic, explore the key benefits of zero trust access.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

PortSys

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Customer Identity and Access Management: A WSO2 Reference Architecture
sponsored by WSO2, Inc.
WHITE PAPER: Customers expect some control around how firms collect, store, manage, and share their profile data. Customer Identity and Access Management (CIAM) addresses these requirements by authenticating, authorizing, collecting and storing information about consumers across many domains. In this white paper, learn everything you need to know about CIAM.
Posted: 09 Aug 2019 | Published: 31 Jul 2019

WSO2, Inc.

Independent Study Pinpoints Significant SCADA/ICS Security Risks
sponsored by Fortinet, Inc.
ANALYST REPORT: Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.
Posted: 09 Aug 2019 | Published: 16 Apr 2019

Fortinet, Inc.

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS

Expanding the Enterprise Perimeter with Zero-Trust Security for the Workforce
sponsored by Ignition Technology Ltd
ANALYST REPORT: To ease the transition from a traditional perimeter and to embrace an evolving workforce, organizations are deploying the building blocks of a zero-trust security framework. In this 2019 Duo Trust Access Report, explore key findings about zero trust and how Duo's customers are adopting different principles.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Ignition Technology Ltd

Two-Factor Authentication Evaluation Guide
sponsored by Ignition Technology Ltd
EBOOK: In the Two-Factor Authentication Evaluation Guide, get an overview of the hidden costs of a two-factor solution and how to determine your ROI, a comprehensive set of criteria to customize your evaluation to your organization's needs, a list of resources needed to deploy, provision and integrate your solution, and more.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Ignition Technology Ltd

CyberArk for Dummies: Privileged Access Security
sponsored by CyberArk Software, Inc
EBOOK: The key to most companies' crown jewels is through privileged access, whether a privileged account, credential, or secret. So if protecting privileged access is so critical, why aren't companies doing more to guard against these types of attacks? In this e-book, learn everything you need to know about protecting privileged access.
Posted: 05 Aug 2019 | Published: 05 Aug 2019

CyberArk Software, Inc

Five Steps To A Zero Trust Network
sponsored by Optiv
ANALYST REPORT: This Forrester report gives security and risk leaders best practices and a 5-step road map to realize the benefits of a Zero Trust strategy more quickly. Read on to learn more.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Optiv

Important Things You Need to Know about Storing Your Identity
sponsored by RSA Conference
WEBCAST: Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.
Posted: 31 Jul 2019 | Premiered: May 16, 2019

RSA Conference

Can Cryptography Save Our Elections
sponsored by RSA Conference
RESOURCE: Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.
Posted: 26 Jul 2019 | Published: 23 May 2019

RSA Conference

Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization
sponsored by FairWarning
WHITE PAPER: 1 in 3 data breaches involve internal actors, according to the Verizon Data Breach Investigation Report 2019. There are many different insider threat profiles that have varying intentions. In this white paper, explore 5 of these profiles and learn how to protect your organization from each.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

FairWarning

Achieving Secure Authentication and Zero-Trust Security Without Agents or Proxies
sponsored by Silverfort
WEBCAST: Silverfort can enable organizations to enforce secure authentication – including MFA, adaptive authentication and zero trust – without deploying software agents or proxies. Tune into this webinar to learn more.
Posted: 15 Jul 2019 | Premiered: Jul 15, 2019

Silverfort

Practical Steps to Take When Implementing Zero Trust
sponsored by TechTarget
RESOURCE: The traditional network perimeter is disappearing, that's why many turn to zero trust. Participate in our multiple-choice survey for a free PDF of our guide Implementing a Zero-Trust Approach to Network Security.
Posted: 13 Jul 2019 | Published: 03 Aug 2019

TechTarget

Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

The Cost of Credential Stuffing
sponsored by Akamai
ANALYST REPORT: Credential stuffing attacks can cause loss of customers and involvement of IT security that can result in an average cost of $1.2 million, according a Ponemon Institute survey. To gain a better understanding of the cost to prevent, detect and remediate credential stuffing attacks download this Ponemon Institute study.
Posted: 11 Jul 2019 | Published: 31 Oct 2018

Akamai

Privacy: Data Protection and Identity Management
sponsored by Micro Focus
WEBCAST: To help enterprises meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. In this webcast, Nathan Turajski, Director of Product Marketing at Micro Focus provides an overview of their Data Protection and Identity Management solution.
Posted: 10 Jul 2019 | Premiered: Feb 28, 2019

Micro Focus

How the Global Law Firm Reduced Help Desk Tickets With Duo's MFA
sponsored by Ignition Technology Ltd
CASE STUDY: Withers Worldwide is a mid-sized law firm, and was experiencing inconsistencies with how employees logged into cloud and on-premises applications. Find out how they used Duo Access to streamline authentication with MFA and keep sensitive data safe in this case study.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Ignition Technology Ltd

How the University of Sunderland Simplified and Enables Mobility and BYOD
sponsored by Ignition Technology Ltd
CASE STUDY: The University of Sunderland was looking for a platform that assured users are who they say they are while still being incredibly easy to use for all members of the university community. In this case study, learn how Duo allowed the university to do this while reducing the impact of cyberattacks.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Ignition Technology Ltd
1 - 25 of 222 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement