IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
1 - 25 of 325 Matches Previous Page  |  Next Page
Multi-Factor Authentication (MFA): Is this the Security Solution You Need?
sponsored by OneLogin
WHITE PAPER: Users want a simple user experience to complement the way they work. IT wants an adequate level of risk mitigation for the organization. Implementation of adaptive Multi-Factor Authentication (MFA) can balance these two factors. Read on to learn more.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Single sign-on: Understanding the role of SSO in security
sponsored by OneLogin
WHITE PAPER: IT is under pressure to securely support large numbers of apps in a hybrid environment. Passwords are a huge problem when it comes to app security because they are difficult for IT departments to manage. Single sign-on or SSO gives users just one password they can use to access all their applications. In this white paper learn about all things SSO.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

OneLogin

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018

Akamai Technologies

MFA Everywhere: Requirements for Rapid Adoption
sponsored by Ping Identity Corporation
WEBCAST: 81% of confirmed data breaches involved weak, default or stolen passwords. This has led to an increase in multi-factor authentication adoption. This webcast reveals why MFA is just reaching wide spread adoption, why it is needed, requirements for implementing it and how to prepare organizations for a successful rollout.
Posted: 19 Dec 2018 | Premiered: Dec 19, 2018

Ping Identity Corporation

SSO+MFA Demo: Stop the #1 Security Attack Vector
sponsored by Ping Identity Corporation
WEBCAST: With credentials being the #1 attack vector, many organizations are replacing passwords with advanced authentication. This webcast discusses 5 key capabilities that can be used to secure the enterprise including multi-factor authentication, single sign-on and access security. During the webcast, you will also be walked through a demo SSO and MFA.
Posted: 19 Dec 2018 | Premiered: Feb 9, 2017

Ping Identity Corporation

The Cost of Credential Stuffing: Asia-Pacific
sponsored by Akamai Technologies
ANALYST REPORT: In this research report, discover the potential cost to prevent, detect and remediate credential stuffing attacks, as well as the financial consequences to companies if attackers are able to use stolen credentials to make fraudulent purchases or transactions.
Posted: 19 Dec 2018 | Published: 30 Jun 2018

Akamai Technologies

Goodbye 2FA. Hello Modern MFA
sponsored by Ping Identity Corporation
WEBCAST: According to Verizon's Data Breach Investigations Report, 81% of hacks involve weak or stolen credentials. Although typical multi-factor authentication is a step in the right direction, many have limited coverage, poor user experience and minimal policy options. In this webcast, learn how contextual MFA eliminates weak credentials.
Posted: 19 Dec 2018 | Premiered: Dec 12, 2017

Ping Identity Corporation

Multi-Factor Authentication: Best Practices for Securing the Modern Digital Enterprise
sponsored by Ping Identity Corporation
WHITE PAPER: Comprised credentials continue to be a top risk for breach with enterprises. One way to combat this issue is with step-up MFA. Step-up multi-factor authentication (MFA) is a dynamic authentication model where the user is required to perform additional authentication operations. This white paper proposes best practices for deployment of step-up MFA.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Ping Identity Corporation

Securing your Enterprise Credentials
sponsored by Ping Identity Corporation
WHITE PAPER: Stealing credentials is the primary motive for those that intend on attacking your enterprise. And relying on usernames and passwords can make it easier for them. In this white paper, learn how to implement an MFA solution to strengthen your security, so you can confidently manage digital transformation across your enterprise.
Posted: 18 Dec 2018 | Published: 30 Jun 2017

Ping Identity Corporation

You Can't Spell Enterprise Security without MFA
sponsored by Ping Identity Corporation
WEBCAST: Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and controls with multi-factor authentication, allowing them to move away from a high-risk, password based security approach. Listen as Paul Madsen from the CTO office of Ping Identity explains the benefits of MFA.
Posted: 18 Dec 2018 | Premiered: Dec 31, 2018

Ping Identity Corporation

Credential Stuffing Attacks: 2018 Security Report
sponsored by Akamai Technologies
RESEARCH CONTENT: In this quarterly report, discover how credential stuffing and advanced DDoS attacks have affected organizations this year.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Akamai Technologies

The Security Leader's Guide to Multi-Factor Authentication
sponsored by Ping Identity Corporation
WHITE PAPER: Multi-factor authentication is a more advanced tool than single-factor authentication and 2-factor authentication. But is it right for you? Inside, learn how to choose the right authentication method for your enterprise, and why you should consider a number of factors including cost, ease of use, and compliance.
Posted: 10 Dec 2018 | Published: 31 May 2017

Ping Identity Corporation

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

Modern Two-Factor Authentication: Easy. Affordable. Secure
sponsored by Duo Security
WHITE PAPER: The ease of stealing IDs and passwords has led to criminals targeting organizations of all sizes. However, two-factor authentication stops easy access to stolen credentials by requiring a second level of authentication. Find out why deploying two-factor authentications may be a better choice for your company.
Posted: 07 Dec 2018 | Published: 31 Dec 2013

Duo Security

Sports-Centric Streaming Service fuboTV Sees 50% ROI - Just from Auth0's Security
sponsored by Auth0
CASE STUDY: Read this case study to find out how fuboTV partnered with Auth0 in order to improve and scale their authentication and authorization workflows.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Auth0

Keep Calm and Authenticate: Why Adaptive is the Next Best Thing
sponsored by WSO2, Inc.
RESOURCE: Explore the evolution of authentication mechanisms, the advantages and disadvantages of each method, and how your organization could benefit from adaptive authentication.
Posted: 08 Nov 2018 | Published: 31 Oct 2018

WSO2, Inc.

Detecting Account Takeovers and Defending Your Users
sponsored by Signal Sciences
WHITE PAPER: In this white paper, learn about account takeover (ATO) attacks and how to defend your users against them.
Posted: 16 Oct 2018 | Published: 31 Dec 2017

Signal Sciences

Identity Analytics: A More Collective Defense
sponsored by One Identity
VIDEO: As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Tune into this webcast for insights on an identity analytics and risk intelligence SaaS program that can help simplify this task.
Posted: 11 Sep 2018 | Premiered: 06 Sep 2018

One Identity

Single Sign-On for Cloud and On Premise Apps
sponsored by Radware
VIDEO: In this webinar, explore Single Sign-On (SSO), see how your enterprise may benefit from implementing this technology, and how Multi-factor authentication (MFA) fits in.
Posted: 07 Nov 2018 | Premiered: 12 Apr 2018

Radware

Blockchain Applications for Identity Verification
sponsored by Evident
WHITE PAPER: Blockchain applications are constantly evolving and show promise for the identity world. Read on to explore 3 specific identity verification applications of digital ledger technology and where they align in the security world.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

Evident

Identity Proofing and GDPR: What Businesses Need to Know
sponsored by Evident
WHITE PAPER: The GDPR has catalyzed immense change and it is poised to cause even more disruption in the years to come. Inside, explore 8 central data subject rights established by GDPR, and uncover the user verification problems associated with the rights.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Evident

Protect Against Compromised Accounts
sponsored by Proofpoint, Inc.
VIDEO: According to recent data from the FBI, in the last 5 years, there have been more than 78K business email account compromise scam incidents worldwide. Download this webcast to learn about why account compromises are on the rise, how they are affecting businesses, and how cybercriminals perform the attack, and more.
Posted: 31 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Büroalltag im Wandel: das Leben am digitalen Arbeitsplatz
sponsored by Citrix
WHITE PAPER: Hier erfahren Sie, wie ein sicherer, integrierter digitaler Arbeitsplatz Ihnen dabei hilft, einen besseren Kundendienst bereitzustellen, Leiharbeiter und mobile Mitarbeiter sicher einzugliedern und den Wettbewerbsvorteil auszubauen.
Posted: 22 Oct 2018 | Published: 09 Nov 2018

Citrix

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
RESOURCE: Discover the importance of identity governance and how you can effectively manage it while taking account of complexity, compliance and limited IT resources.
Posted: 01 Oct 2018 | Published: 31 Dec 2017

One Identity

Identity-Driven Security
sponsored by Okta
WHITE PAPER: Find out how to bolster your security posture by upping your defenses against threats – both internal and external – with identity-driven security that strives to improve identity and access management as well as authentication.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Okta
1 - 25 of 325 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement