Software > IT Security > Access control, authorization concepts

Current market overview - software for access control and authorization concepts

In this SoftGuide section, you will find an overview of software and solutions on the topic of access control and authorization concepts. The software listed here are generally used in the context of data protection for monitoring and correcting defaults for file access rights or system access rights, and offers, among other things, RACF profile management, security auditing and continuous monitoring, depending on the program solution. Administrators can use these tools to manage complex networks consisting of multiple servers and workstations directly from a workstation.

Leave us the

show 1 to 2 (of 2 entries)
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On
The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
show 1 to 2 (of 2 entries)
1

Search in similar categories:

Authentication Systems, Biometrics Data Encryption, Cryptography Time recording, working time recording
Show all 336 Software categories