IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
1 - 25 of 324 Matches Previous Page  |  Next Page
Keep Calm and Authenticate: Why Adaptive is the Next Best Thing
sponsored by WSO2, Inc.
RESOURCE: Explore the evolution of authentication mechanisms, the advantages and disadvantages of each method, and how your organization could benefit from adaptive authentication.
Posted: 08 Nov 2018 | Published: 31 Oct 2018

WSO2, Inc.

Single Sign-On for Cloud and On Premise Apps
sponsored by Radware
VIDEO: In this webinar, explore Single Sign-On (SSO), see how your enterprise may benefit from implementing this technology, and how Multi-factor authentication (MFA) fits in.
Posted: 07 Nov 2018 | Premiered: 12 Apr 2018

Radware

Blockchain Applications for Identity Verification
sponsored by Evident
WHITE PAPER: Blockchain applications are constantly evolving and show promise for the identity world. Read on to explore 3 specific identity verification applications of digital ledger technology and where they align in the security world.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

Evident

Identity Proofing and GDPR: What Businesses Need to Know
sponsored by Evident
WHITE PAPER: The GDPR has catalyzed immense change and it is poised to cause even more disruption in the years to come. Inside, explore 8 central data subject rights established by GDPR, and uncover the user verification problems associated with the rights.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

Protect Against Compromised Accounts
sponsored by Proofpoint, Inc.
VIDEO: According to recent data from the FBI, in the last 5 years, there have been more than 78K business email account compromise scam incidents worldwide. Download this webcast to learn about why account compromises are on the rise, how they are affecting businesses, and how cybercriminals perform the attack, and more.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

5 Things to Keep in Mind when Choosing a Single Sign-On Solution
sponsored by Citrix
WHITE PAPER: Your apps are evolving, and the only way to ensure true end-to-end secure Single Sign-On (SSO) access and a seamless user experience to your users is with the right solution. Learn about the essential features you should prioritize when evaluating an SSO solution.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Citrix

Detecting Account Takeovers and Defending Your Users
sponsored by Signal Sciences
WHITE PAPER: In this white paper, learn about account takeover (ATO) attacks and how to defend your users against them.
Posted: 16 Oct 2018 | Published: 31 Dec 2017

Signal Sciences

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
RESOURCE: Discover the importance of identity governance and how you can effectively manage it while taking account of complexity, compliance and limited IT resources.
Posted: 01 Oct 2018 | Published: 31 Dec 2017

One Identity

Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Simple and Smart Security for the Enterprise Cloud
sponsored by MobileIron
RESOURCE: Download this resource to learn about a new security framework that allows your organization to confidently adopt mobile-cloud technologies while reducing the risk of data breaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

MobileIron

Kubernetes Open-Source Orchestration & Security
sponsored by Aqua Security
RESOURCE: For those who use the open-source capabilities of Kubernetes security, there are 4 types of threats that you should know about. In this resource, explore a discussion of threat models, various security considerations and best practices for optimizing your Kubernetes deployment.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

Two-Factor Authentication That Makes Users and IT Security Happy
sponsored by One Identity
WHITE PAPER: Download this white paper to learn about One Identity, an identity and access management tool that uses a set of factors to assess the risk a given access attempt represents, and respond with appropriate security measures.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

One Identity

Identity-Driven Security
sponsored by Okta
WHITE PAPER: Find out how to bolster your security posture by upping your defenses against threats – both internal and external – with identity-driven security that strives to improve identity and access management as well as authentication.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Okta

Strong Authentication Across the Enterprise
sponsored by Okta
VIDEO: As organizations and workplaces evolve, less control is exercised over devices, services, and networks, leading to a gap with traditional security tools. Tune into this webinar for a look at how your organization can gain strong authentication across the enterprise.
Posted: 27 Aug 2018 | Premiered: 27 Aug 2018

Okta

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

Take Back Control of Access Management: Data Sheet
sponsored by IBM
DATA SHEET: In the face of identity fraud, regulatory compliance, and BYOD, it is important for organizations to have advanced security access management to control and protect critical assets, on- and off-premise cloud environments, and more. Download this data sheet to learn how your organization can take back control.
Posted: 02 Aug 2018 | Published: 31 Jan 2017

IBM

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 31 Jul 2018 | Published: 31 Jul 2016

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESEARCH CONTENT: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM

Design an Identity and Access Management Program Optimized for your Business
sponsored by IBM
WHITE PAPER: Put your current identity and access management (IAM) program to the test. Find out how your business can benefit from an IAM program that can help enable productivity and collaboration, ensure regulatory compliance is achieved, reduce the costs of performing audits, and more.
Posted: 30 Jul 2018 | Published: 31 Jul 2016

IBM

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 30 Jul 2018 | Published: 21 Feb 2018

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

Better Access Governance: Looking Beyond Roles
sponsored by IBM
WHITE PAPER: Managing users and their entitlements doesn't have to be a complicated process. Learn how better access governance can clear the confusion of proper user access within your business.
Posted: 27 Jul 2018 | Published: 31 Oct 2016

IBM

The Forrester Wave: Risk-Based Authentication
sponsored by IBM
RESEARCH CONTENT: Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.
Posted: 26 Jul 2018 | Published: 17 Jul 2017

IBM
1 - 25 of 324 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement