IT Management  >   Systems Operations  >   Security  >   AAA  >  

Authorization

RSS Feed   
ALSO CALLED: Authorization Codes
DEFINITION: Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating  … 

Authorization definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Authorization Reports
51 - 75 of 306 Matches Previous Page  |  Next Page
How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

Zero Trust Network Access
sponsored by VMware, Inc.
EBOOK: VMware Secure Access provides enterprises a way for their employees to leverage a secure and fast connection to cloud-based applications and corporate technical resources. Read the e-book to get the full details.
Posted: 20 Nov 2020 | Published: 31 May 2019

VMware, Inc.

Success from the Start: Top Tips For Beginning An ID Badge Or Card Program
sponsored by HID Global
EBOOK: For organizations embarking on an ID badge/card program there are a number of key implementation steps and often overlooked – but vital – considerations to make to ensure success from the start. This eBook provides insight into these planning considerations, and more – read on to unlock your copy.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

HID Global

Fargo® Ink1000
sponsored by HID Global
DATA SHEET: Classrooms, offices and stores are beginning to open their doors again, and employees need an effective, secure and reliable card printer for their return to business as usual. Introducing the HID FARGO® INK1000desktop-based card printer. Read this data sheet to learn more about the Fargo Ink1000 Inkjet card printer from HID.
Posted: 13 Nov 2020 | Published: 25 Aug 2020

HID Global

Key IAM Automation Policies and Controls for Stronger Governance
sponsored by Hitachi Vantara
RESOURCE: Colleges and universities need a flexible IAM solution that can keep users secure and systems compliant. Still, many schools stick with manual homegrown, legacy systems believing they’re the only way to ensure both flexibility and security. But there’s a simpler way. Read this short article to learn 3 key policies for IAM automation.
Posted: 12 Nov 2020 | Published: 15 Sep 2020

Hitachi Vantara

How Higher Education Can Combat Hackers with IAM Automation
sponsored by Hitachi Vantara
RESOURCE: Threat actors target colleges and universities because of their vast wealth of personal information, extensive pools of research and ever-growing collections of data, and the number of attacks on these institutions is increasing – in large part due to automation. How can these attacks be defended? View this article to learn the answer.
Posted: 12 Nov 2020 | Published: 15 Oct 2020

Hitachi Vantara

IAM Automation: The Secret to Governance and Cybersecurity Success in Higher Ed
sponsored by Hitachi Vantara
RESOURCE: Remote and hybrid learning models require increased remote access – underlining the importance of effective IAM security and governance. But how can schools keep up with the growing number of remote devices? Automation. Read this article to learn how to incorporate IAM automation into higher ed institutions.
Posted: 11 Nov 2020 | Published: 08 Sep 2020

Hitachi Vantara

IAM Automation Controls Prevent the Risks in Higher Education
sponsored by Hitachi Vantara
RESOURCE: Higher education institutions face a unique set of identity and access management (IAM) challenges – namely finding and mitigating risks related to orphan and dormant accounts. Read this article to learn about how IAM automation controls can address these risks.
Posted: 11 Nov 2020 | Published: 30 Sep 2020

Hitachi Vantara

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

GARANCY Password Management
sponsored by Beta Systems
PRODUCT OVERVIEW: Passwords are more often a security detriment than they are helpful in protecting an organization against risks – which has led to a rise in password management and synchronization tools. Read this solution brief for a closer look at GARANCY Password Management, designed to bolster security while reducing complexity and costs.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Loyalty for Sale – Retail and Hospitality Fraud
sponsored by Akamai Technologies
ANALYST REPORT: The numbers speak for themselves: Retail, travel and hospitality all attracted a startling 63% of credential stuffing attacks and 41% of web attacks. In this new State of the Internet/Security report, Akamai goes beyond this data, taking you into the criminal marketplace that makes these industries and their loyalty programs such popular targets.
Posted: 04 Nov 2020 | Published: 30 Oct 2020

Akamai Technologies

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

What You Should Know About Your Identity & Access Management
sponsored by Beta Systems
WHITE PAPER: This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.
Posted: 04 Nov 2020 | Published: 31 Jan 2019

Beta Systems

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Beyond Identity and Ping Identity Solution Brief
sponsored by Beyond Identity, Inc.
DATA SHEET: With the increase in both cloud application use and remote work, creating and scaling access management controls is growing more complex. Read up on a new partnership that is working to solve this problem by delivering passwordless authentication, improved end-user experience, risk-based authorization and reduced IT costs and overhead.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Beyond Identity, Inc.

Financial Services
sponsored by Hitachi ID
PRODUCT OVERVIEW: Given increasingly stringent compliance mandates within the financial industry, it’s no surprise that managing risk and maintaining compliance are top of mind – especially when it comes to authentication or IAM programs. Read this solution brief to see how Hitachi ID is helping financial organizations meet their privacy and compliance needs.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Hitachi ID

Maintaining Business Momentum In The Face Of Forced Change: The Active Directory Angle
sponsored by Quest
WHITE PAPER: With the frantic pace of today’s business world, organizations struggle to keep up with requests to create, change and remove access to their on-premises AD. This scenario becomes even more complicated when you mix in a hybrid AD environment. Read this white paper to learn why properly-tuned AD lifecycle management is crucial for handling change.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

Beyond Identity and Okta Solution Brief
sponsored by Beyond Identity, Inc.
PRODUCT OVERVIEW: Password-based authentication methods and a thing of the past. This solution brief explores the partnership between Beyond Identity and Okta, highlighting how they are working together to help organizations eliminate passwords, improve user experience, reduce IT costs, and more – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020

Cysiv
51 - 75 of 306 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info