IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
26 - 50 of 306 Matches Previous Page  |  Next Page
On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security

Software-Defined Perimeter
sponsored by NetMotion
RESOURCE: Now that remote work is nearly ubiquitous, employees are accessing company resources from a variety of devices and networks. This change widens an organization’s attack surface, and therefore, security teams are researching new technologies to protect networks – for example, the software-defined perimeter (SDP). Read more here.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

NetMotion

Axis Security Video 1: Application Access Cloud
sponsored by Axis Security
VIDEO: Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.
Posted: 07 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

A Fast Path Guide to Success
sponsored by Appsian
RESOURCE: For financial risk management and security leaders, protecting legacy ERP data in the age of remote work is shaping up to be a significant challenge in the new year. Read this blog post to learn more about the Appsian Security Platform and how its features are designed to identify remote security risks and protect ERP data.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Appsian

A 4-Part Guide to Securing Your Digital Identities
sponsored by JumpCloud
WHITE PAPER: If you or members of your organization haven’t yet had conversations about securing digital identity, it’s time to start. Through this 4-part guide, take in an extensive overview of IAM, the challenges that come with securing it and the solutions and technologies that can help you build stronger digital identity security.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

JumpCloud

Simplify Zero-Trust Security from the Cloud
sponsored by JumpCloud
WHITE PAPER: The surging number of remote users, device types and cloud-based resources calls for a security framework that grants access to identity, device and network rather than only one or two. This is the essence of zero trust. Open this white paper to view a specific outline of zero-trust security and how to implement it with a cloud directory platform.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

JumpCloud

How to Manage macOS Systems Remotely with an MDM
sponsored by JumpCloud
WHITE PAPER: The mobile device management (MDM) and identity and access management (IAM) markets were heavily impacted by the global shift to remote work in 2020. This white paper highlights some of the major changes and offers guidance for remotely securing and managing macOS systems in your fleet.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

JumpCloud

BlackBerry Cyber: Video
sponsored by BlackBerry
VIDEO: According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

BlackBerry

BlackBerry Cyber Suite
sponsored by BlackBerry
PRODUCT OVERVIEW: In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

BlackBerry

Arrow & RSA Video 1: Password-less Authentication
sponsored by Arrow & RSA
PODCAST: Passwords have been trusted by organizations for decades, and they’ve worked well, but as time goes on, bad actors are getting smarter and smarter, and passwords are getting weaker and weaker. So, what does the future of authentication hold if not passwords? Listen to this RSA-sponsored discussion about password-less authentication to find out.
Posted: 23 Dec 2020 | Premiered: Dec 23, 2020

Arrow & RSA

Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access
sponsored by Arrow & RSA
WEBCAST: Digital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.
Posted: 23 Dec 2020 | Premiered: Aug 12, 2020

Arrow & RSA

A New Paradigm for Identity Assurance
sponsored by Arrow & RSA
WHITE PAPER: Today’s cyberthreats target either the users with access to critical data, or the data itself – and traditional security approaches are no longer viable against these attacks. The following whitepaper explores how identity assurance is changing, the role of authentication, and how to better protect your users and data – read on to get started.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Arrow & RSA

Barracuda CloudGen Access
sponsored by Barracuda
DATA SHEET: Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

Simplify Card Printing with the Affordable & Efficient HID Fargo INK1000
sponsored by HID Global
EBOOK: This e-book provides a closer look at HID’s FARGO INK100, an affordable, low-maintenance and efficient ID printer designed to provide high quality printing for ID badges, student or faculty IDs, gift and loyalty cards – read on to learn more about the printing technology.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

HID Global

Has ID Card Issuance Been Marooned on a Desert Island?
sponsored by HID Global
WHITE PAPER: As organizations today put more considerations into how they secure access to critical data, the case for incorporating security cards becomes stronger. Read this brief to discover 10 reasons why ID card issuance is worth revisiting and explore the benefits organizations could realize from its use.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

HID Global

5 Steps to Secure Home Devices & Improve Productivity for Remote Work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Why Zero Trust, Why Now
sponsored by Microsoft
RESOURCE: Zero trust isn’t a new concept, but its rise in popularity is relatively recent. But why did it take so long to catch on? And what is it about today’s unique challenges that make zero trust especially pertinent? Read this article to find out.
Posted: 17 Dec 2020 | Published: 17 Dec 2020

Microsoft

Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE: The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020

Atakama

Zero-Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Digital transformation has emerged as a key driver to cloud migration – in fact, 83% of workloads are expected to be cloud-based by the end of the year. Securing your data as you migrate it to the cloud is essential. Read this article to learn more about common cloud migration challenges and how to protect your data in transition.
Posted: 10 Dec 2020 | Published: 28 Oct 2020

Atakama

Security: Creating Trust in a Zero-Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

Customer Attitudes to Digital Identity
sponsored by Onfido
WHITE PAPER: Digital identity is often discussed in the context of the benefits it provides the organization – but what about its impact on the customer? This report provides a closer look at the importance of digital identity for customer relationships, general perception and current solutions that may be worth your consideration – read on to get started.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

Cloud Enablement
sponsored by Atakama
CASE STUDY: Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Atakama
26 - 50 of 306 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info