Software > IT Security > Access Control and Authorization

Access Control and Authorization Software

In this SoftGuide section, you will find an overview of software and solutions on the topic of access control and authorizatio. The software listed here are generally used in the context of data protection for monitoring and correcting defaults for file access rights or system access rights, and offers, among other things, RACF profile management, security auditing and continuous monitoring, depending on the program solution. Administrators can use these tools to manage complex networks consisting of multiple servers and workstations directly from a workstation.

Are you looking for a suitable access control or authorization software?
show 1 to 3 (of 3 entries)
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
HelloID
Business Rules (RBAC): Ensuring Data Security with Secure Cloud Access
Business Rules (RBAC): Ensuring Data Security with Secure Cloud Access Thanks to freely definable business rules, you can ensure uniform, consistent and transparent assignment of systems and authorizations to your users. The assignment is based, for example, on the user's location and function within the organization (role-based authorization assignment, RBAC). In this way, each user only receives the authorizations he or she needs to perform his or her tasks (Principle of Least Use). This limits potential security gaps, reduces the risk of data loss, and helps your organization pass audits more easily.
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
show 1 to 3 (of 3 entries)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 352 Software categories