IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
1 - 25 of 268 Matches Previous Page  |  Next Page
Security Built to Work Outside the Perimeter: 3 Reasons to Choose Adaptive Multi-Factor Authentication
sponsored by Okta
WHITE PAPER: Download this resource to compare 2-Factor Authentication, Multi-Factor Authentication and Adaptive Multi-Factor Authentication and learn which option can provide your organization with the security measures you need.
Posted: 16 Jul 2018 | Published: 16 Jul 2018

Okta

The 6 Myths About Account Takeover
sponsored by SpyCloud
VIDEO: Are you using the right technology to prevent hackers from stealing your credentials? Uncover the truth about account takeovers and the steps your enterprise should be taking to prevent cybercriminals from accessing company sensitive data.
Posted: 11 Jul 2018 | Premiered: 11 Jul 2018

SpyCloud

The Rising Threat of Account Takeover
sponsored by SpyCloud
RESOURCE: Password security is vital in all aspects of an enterprise and stolen credentials are no joke. Find out how you can help protect your business from a damaged reputation and future data breaches.
Posted: 11 Jul 2018 | Published: 31 Oct 2017

SpyCloud

PIM, PAM and PUM: 2018 Fundamentals and Best Practices for Linux/Unix Privileged Identity and Access Management
sponsored by HelpSystems
WHITE PAPER: This white paper touches on the importance of PIM, PUM and PAM understanding and planning. Find out how you can transform your multi-vendor Linux and Unix server environment into one centrally managed security domain to simplify security policies and control access rights.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

The Essentials: Privileged Access Management
sponsored by HelpSystems
WHITE PAPER: Find out how you can effectively control and protect privileged UNIX and Linux accounts using centralized access management.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

HelpSystems

The Future of Identity and Access Management Tools
sponsored by Jumio
EGUIDE: Fingerprints, facial recognition, and voice recognition are now on the market as identity management tools, but much more is still needed. Find out how organizations plan to implement a new level of identity management that relies less on user actions and more on known things, places, and experiences.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

Strengthen Your Identity Security
sponsored by F5 Networks
EBOOK: This e-book acknowledges today's challenges with identity and access management and explores the capabilities and potential benefits for Active Directory Federation Services (AD FS) and Office 365.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

F5 Networks

The 2018 Duo Trusted Access Report
sponsored by Duo Security
RESEARCH CONTENT: Take a look at this 13-page 2018 Duo Trusted Access Report to learn about the evolution of enterprise security and overall device health.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

Duo Security

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

Akamai Technologies

When Making a Build vs. Buy Decision About IAM and Dynamic Authorization, Remember DIY's Hidden Costs
sponsored by Axiomatics
RESOURCE: If you're looking for IAM and dynamic authorization for your applications, it's not always clear whether you should build a solution in-house, or purchase from an outside vendor. In this resource take a look at the hidden costs of DIY to help decide which option is best for your organization.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Axiomatics

Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE: Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

The Key to API Security
sponsored by Axiomatics
WHITE PAPER: The management and enforcement of authentication and authorization is critical to securing APIs, and Attributed Based Access Control (ABAC) can do just that. Download this resource to learn about the features of ABAC, and how it can benefit your organization.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Axiomatics

Securing content and access with smart management techniques
sponsored by SearchContentManagement
EBOOK: When it comes to ECM systems, the challenge for content management executives is to balance security with accessibility. To help with this task, here is a handbook of best practices – exploring topics on CMS security, IAM strategies, Office 365 and more.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

SearchContentManagement

Considerations When Choosing the Best Strong Authentication Approach
sponsored by HID Global
WHITE PAPER: Discover the variables that should be considered when choosing the best authentication solution for your organization.
Posted: 14 May 2018 | Published: 14 May 2018

HID Global

Password Security Guidelines
sponsored by TechTarget
RESOURCE: Your employees are vulnerable to hackers – they're targeted with machine learning or traditional password guessing methods. To help keep your enterprise safe, we're offering access to this member-exclusive guide, Password Security Guidelines.
Posted: 28 Apr 2018 | Published: 30 Jun 2018

TechTarget

Complete Guide to Preventing Account Takeover
sponsored by Sift Science
WHITE PAPER: Access this guide to preventing account takeover to learn how to tackle online business' latest foe: compromised accounts.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

Sift Science

Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 20 Apr 2018 | Published: 16 Aug 2017

Gemalto

2018 Identity and Access Management Index Report
sponsored by Gemalto
RESEARCH CONTENT: According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a look at this report to learn about where organizations stand in terms of IAM and how they plan to augment security in the near future.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Gemalto

Managing Fraud Risks in the Digital World
sponsored by SAS
WHITE PAPER: New digital product and payment methodologies have presented fresh opportunities for fraudsters and different challenges for fraud managers. Access this resource to uncover how to stay secure and manage fraud risks in the digital world.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Simplifying Fraud Analytics
sponsored by SAS
WHITE PAPER: According to SAS, as losses continue to grow, detecting and preventing fraud is consistently ranked among the top three investment and strategic priorities for insurance executives. Explore this resource to uncover 10 steps to detecting and preventing insurance fraud.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

SAS

Protect the Integrity of the Procurement Function
sponsored by SAS
WHITE PAPER: The procurement process is extremely complex and as a result, fraud detection is challenging. Take a look at this resource to uncover trends and best practices in detecting and preventing global procurement fraud.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

SAS

Banking Across Generations Study
sponsored by Jumio
WHITE PAPER: According to Javelin Strategy and Research, 20% of individuals who have abandoned mobile banking blame it on the authentication process being time consuming. Take a look at this resource to gain insight into improving authentication and security within mobile banking, while ensuring a smooth customer experience.
Posted: 05 Apr 2018 | Published: 05 Apr 2018

Jumio

A Buyer's Guide to Online Identity Verification
sponsored by Jumio
WHITE PAPER: Because of cybercriminals and routine data breaches, trust is in increasingly short supply. This resource reveals how to evaluate vendors in the emerging trusted identity as a service space.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

Jumio

Regulating Privileged Access: Leveraging the Human Factor for Better Security
sponsored by One Identity
WHITE PAPER: 81% of data breaches involve the misuse of privileged credentials, according to the Verizon DBIR. This white paper examines how privileged access management (PAM) can help reduce the risk associated with privileged accounts.
Posted: 11 May 2018 | Published: 11 May 2018

One Identity

Authentication 101: What You Need to Know
sponsored by HYPR
EGUIDE: What does your enterprise need to know about the FIDO authentication framework? In this expert e-guide, security pros Randall Gamby and Alastair Cooke dive into the FIDO authentication framework and offer 6 VDI testing steps for deployment.
Posted: 22 Mar 2018 | Published: 20 Mar 2018

HYPR
1 - 25 of 268 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement