RSS feed Get our RSS feed

News by Topic

authorization

Results 26 - 36 of 36Sort Results By: Published Date | Title | Company Name
By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : autho, industry identity, authentication, database information, custom and proprietary code, security
     Auth0
By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : device management, security management, mobility, application security, management solutions
     Centrify
By: Winshuttle     Published Date: Dec 04, 2006
This article describes an easy non-technical alternative to LSMW to update customer master records in SAP in fewer steps than LSMW, without technical involvement, and without requiring authorizations in SAP.
Tags : sap, master record, master records, legacy system migration workbench, lsmw, data migration, data management, winshuttle
     Winshuttle
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : likewise, pci data security, linux, unix, mac os x, windows
     Likewise Software
By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : likewise, risk, compliance, sox, security
     Likewise Software
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: Manning Fulton & Skinner, P.A.     Published Date: Mar 18, 2011
Key points of the Unemployment Insurance Reauthorization and Job Creation Act of 2010 and how it impacts individual income tax and estate and gift tax
Tags : estate planning, income tax, gift tax, alternative minimum tax, financial planning, finance, tax
     Manning Fulton & Skinner, P.A.
By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
     Radiant Logic, Inc
By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
     NETIQ
By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : access manager, security, cloud service, microsoft office 365, it strategies
     IBM
By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
     Datastax
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics