IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
1 - 25 of 194 Matches Previous Page  |  Next Page
A Holistic Approach To Identity And Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.
Posted: 11 Apr 2019 | Published: 23 Feb 2018

HID Global

Supporting Business Agility in a Connected World
sponsored by HID Global
WHITE PAPER: In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

HID Global

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

Webinar: What's New in iOS 12 Security
sponsored by Data Theorem
WEBCAST: This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.
Posted: 10 Apr 2019 | Premiered: Oct 22, 2018

Data Theorem

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security
sponsored by HID Global
WHITE PAPER: For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Case Study: Columbia County Sheriff
sponsored by HID Global
CASE STUDY: The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.
Posted: 10 Apr 2019 | Published: 19 Jan 2018

HID Global

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Evaluating Identity Verification Solutions
sponsored by Onfido
RESOURCE: When evaluating an Identify and Access Management system, there are many criteria to look out for. Download this interactive checklist to help you.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Onfido

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
PRODUCT OVERVIEW: Organizations that want to secure access to their premises, applications and networks run into significant challenges. Unfortunately, the technology to address those issues can sometimes require products from up to 12 different vendors. Download this product overview to learn about HID PIV and how it can address all those challenges.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

HID Global

FUJITSU PalmSecure for Mobile Devices
sponsored by TechData - Fujitsu
PRODUCT OVERVIEW: Learn about FUJITSU PalmSecure and how their palm vein imaging technology can be used for secure identification and authentication on mobile endpoints in your organization.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

TechData - Fujitsu

Avoid Authentication Anarchy: How to Choose your Authenticator
sponsored by HID Global
RESOURCE: Stronger authentication is critical to protecting your environment from ever increasing security breaches. Learn how to protect your organization today.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

HID Global

Quarterly Threat Report Q4
sponsored by Rapid7
RESEARCH CONTENT: This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. The report provides an assessment of threat events by organization size and industry, and examines threat incident patterns. Download the report to explore highlights from the 2018 Q4 report.
Posted: 08 Apr 2019 | Published: 26 Feb 2019

Rapid7

Solving the Password Problem in the Technology Industry
sponsored by OneLogin
WHITE PAPER: Download this white paper to learn how adaptive authentication and single sign-on can help your organization reduce the attack surface of hackers and add a layer of protection beyond passwords.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

OneLogin

5 Steps for a Successful IDM Deployment
sponsored by Optiv
WHITE PAPER: Identity and Data Management (IDM) is a complex and ever-shifting aspect of every organization's IT structure. It's no surprise, then, that IDM is essential yet challenging, involving policy design, role-mapping and identity and data controls. In this white paper, discover 5 steps for a successful IDM deployment.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Optiv

Identity and Data Management: The Strategic Imperative
sponsored by Optiv
WHITE PAPER: In the era of digital transformation, identity and data management (IDM) is essential to strategic security programs to protect and control continuously shifting assets needed in business enablement initiatives. In this white paper, explore key elements that Optiv recommends organizations include in their strategic IDM program.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Optiv

You Can Get IAM Right
sponsored by One Identity
BOOK: In this e-book created exclusively for the RSA Conference, discover the most pressing IAM issues faced by virtually every organization and actionable, affordable and sustainable approaches to the IAM challenges you face.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

One Identity

The Breach Prevention Playbook
sponsored by One Identity
WHITE PAPER: Today's breaches leave us knowing that IAM and password security is more important than ever before. In this e-book, discover IAM practices and technologies that can bolster your chances of not only surviving the inevitable breach but enabling your organization to emerge with minimal damage.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

One Identity

G Suite Security and Trust
sponsored by Dito
EBOOK: In this e-book, learn how the robust security features in the G Suite are designed to protect your business from threats like major spear-phishing attacks. These features include cutting-edge cloud security, encryption, access and authentication and more.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Dito

How to Align with the NIST Cybersecurity Framework
sponsored by Forescout
EBOOK: Adopting the NIST framework provides organizations with a structure to outline their current state of cybersecurity and strengthen their overall security. In this e-book, explore how Forescout's SilentDefense can facilitate adoption of the 3-part NIST Cybersecurity Framework.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Forescout

Security and Efficiency Benefits Realized With HP MPS and HP Access Control
sponsored by HP
CASE STUDY: Security experts are advising and clients are demanding that law firms protect their confidential data with the highest level of IT security solutions. In this case study, learn how one legal firm chose to enhance print management and security through a HP Managed Print Services solution.
Posted: 13 Mar 2019 | Published: 31 Jan 2017

HP

Security vs. Mobility in Today's Workplace
sponsored by HP
JOURNAL ARTICLE: BYOD isn't going anywhere, so it's up to IT to make sure mobile security practices are as painless as possible. In this article, learn how different forms of authentication can help your organization balance security vs. mobility today.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

HP

5 Must Haves for your Access Solution
sponsored by Akamai Technologies
RESOURCE: Download this infographic for five demands you should make of an updated, comprehensive application access solution.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Akamai Technologies

Revitalizing Privacy and Trust in a Data-Driven World
sponsored by Micro Focus & PwC
RESEARCH CONTENT: Many organizations worldwide are not doing all they can to protect privacy. Privacy risk management needs reinvigoration and stronger integration with cybersecurity.This report draws on key findings from the 2018 Global State of Information Security Survey to offer 9 tips on revitalizing privacy and trust in a data-driven world.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Micro Focus & PwC

Ensure That Biometric Authentication Technologies Are Secure
sponsored by Onfido
EGUIDE: Biometrics are often perceived as being more secure than traditional passwords. However, this is not always the case. In this e-guide, learn how researchers at the University of North Carolina at Chapel Hill achieved authentication using a virtual reality model of an authorized user's face.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Onfido
1 - 25 of 194 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement