A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.
« Back to Glossary IndexA mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.
© 2024 Cyberlandia.
Technologies
Zero Trust
Global Cloud Infrastructure
Secure Web Gateway (SWG)
Cloud Application Control (CASB)
Remote Browser Isolation (RBI)
Secure Email Gateway (SEG)
Email Encryption Enforcement
Identity Access Management (IAM)
Two-Factor Authentication (2FA)
Single Sign-On (SSO)
AntiVirus (A/V)
Data Loss Prevention (DLP)
SSL/TLS Inspection
Mobile Security
Resource Library
Brochures
Data Sheets
Videos
Webinars
Security Snapshot
Are you secure now? Use this test to understand your current level of cybersecurity.
Security ROI
Is cybersecurity worth the expense for your organization? Find out here.
Cybersecurity Competitive Matrix
See why the Cyberlandia solution is the most comprehensive solution.