Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
o
- Organizational Identity Description: Organizational identity refers to the digital representation of an organization in technological systems and platforms, playing a(...) Read more
- Online Identity Description: Online identity refers to the digital representation of an individual or organization on the Internet, manifested through profiles,(...) Read more
- OpenID Connect Discovery Description: OpenID Connect is an authentication protocol based on the OAuth 2.0 standard, designed to allow clients to discover identity(...) Read more
- Organizational Role Description: The organizational role in identity and access management refers to a defined position within an organization that has specific(...) Read more
- OpenID Token Description: An OpenID token is a fundamental element in the authentication process that allows users to access multiple online services using a(...) Read more
- OpenID Connect Token Description: An OpenID Connect token is a fundamental element in the authentication process that allows users to access multiple online(...) Read more
- On-Demand Access Description: On-demand access is a security model that allows users to access resources and services as needed, without requiring prior approval(...) Read more
- Ownership Management Description: Ownership management in the context of Zero Trust security refers to the process of managing and controlling access to data and(...) Read more
- Obfuscation Techniques Description: Obfuscation techniques are methods used to obscure data in order to protect it from unauthorized access. These techniques are(...) Read more
- Organizational Policy Description: Organizational Policy in the context of Data Loss Prevention refers to a set of guidelines and procedures established by an(...) Read more
- Onsite Security Description: Onsite Security refers to the physical and logical measures implemented to protect data stored in a specific location, such as a(...) Read more
- Overarching Policy Description: An overarching data loss prevention policy is a set of guidelines and procedures designed to protect sensitive information and(...) Read more
- Open Source Security Information Management Description: Open Source Security Information Management refers to security information management systems that are based on open source(...) Read more
- On-Premises SIEM Description: The On-Premises SIEM, or Security Information and Event Management System, is a solution that is installed and operated within an(...) Read more
- Online Threat Intelligence Description: Online threat intelligence refers to the collection and analysis of information about cyber threats, aimed at predicting and(...) Read more