IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
1 - 25 of 315 Matches Previous Page  |  Next Page
Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Simple and Smart Security for the Enterprise Cloud
sponsored by MobileIron
RESOURCE: Download this resource to learn about a new security framework that allows your organization to confidently adopt mobile-cloud technologies while reducing the risk of data breaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

MobileIron

Kubernetes Open-Source Orchestration & Security
sponsored by Aqua Security
RESOURCE: For those who use the open-source capabilities of Kubernetes security, there are 4 types of threats that you should know about. In this resource, explore a discussion of threat models, various security considerations and best practices for optimizing your Kubernetes deployment.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

Two-Factor Authentication That Makes Users and IT Security Happy
sponsored by One Identity
WHITE PAPER: Download this white paper to learn about One Identity, an identity and access management tool that uses a set of factors to assess the risk a given access attempt represents, and respond with appropriate security measures.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

Microsoft Vulnerabilities Report Security Fundamentals
sponsored by Avecto Ltd
RESEARCH CONTENT: In this Microsoft security report, learn about the incredibly important role played by making sure Windows admin rights are properly allocated – and what vulnerabilities can be opened up when they're not.
Posted: 09 Aug 2018 | Published: 31 Dec 2017


A Guide to Endpoint Privilege Management Security Fundamentals
sponsored by Avecto Ltd
WHITE PAPER: Learn what endpoint privilege management is and how it helps defend against malware threats. Plus, get tips on how to deploy endpoint privilege management technology that fits into your existing security systems.
Posted: 09 Aug 2018 | Published: 08 Aug 2018


Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control.
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 31 Jul 2018 | Published: 31 Jul 2016

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESEARCH CONTENT: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 30 Jul 2018 | Published: 31 Jul 2016

IBM

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 30 Jul 2018 | Published: 21 Feb 2018

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

The Forrester Wave: Risk-Based Authentication
sponsored by IBM
RESEARCH CONTENT: Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.
Posted: 26 Jul 2018 | Published: 17 Jul 2017

IBM

The Forrester Wave: Risk-Based Authentication
sponsored by IBM
RESEARCH CONTENT: Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.
Posted: 26 Jul 2018 | Published: 17 Jul 2017

IBM

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM

2018 Data Security Confidence Index Report
sponsored by Gemalto
RESOURCE: Uncover some key findings from both IT decision makers and consumers about the security of their most sensitive corporate data. Read on to see how your organization could benefit from a change in security measures.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Gemalto

The Emergence of Unified Access Management
sponsored by OneLogin
EBRIEF: In a recent survey from 451 Research, 55% of respondents said security and compliance are what is stopping them from using a hosted IT infrastructure. Explore this business impact brief to see how unified access management can help alleviate these security concerns.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

OneLogin

Buyer's Guide: Access and Authentication
sponsored by IBM
WHITE PAPER: Transform and accelerate secure access to your organization's applications today. Read on to find out how your enterprise can benefit from a strong, secure access management program in this quick and informative buyer's guide to IBM Security Access Manager.
Posted: 25 Jul 2018 | Published: 30 Apr 2017

IBM

Identity-Driven Security
sponsored by Okta
WHITE PAPER: Find out how to bolster your security posture by upping your defenses against threats – both internal and external – with identity-driven security that strives to improve identity and access management as well as authentication.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Okta

Strong Authentication Across the Enterprise
sponsored by Okta
VIDEO: As organizations and workplaces evolve, less control is exercised over devices, services, and networks, leading to a gap with traditional security tools. Tune into this webinar for a look at how your organization can gain strong authentication across the enterprise.
Posted: 27 Aug 2018 | Premiered: 27 Aug 2018

Okta
1 - 25 of 315 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement