Hitachi

Hitachi ID Systems
  • Français
  • Sitemap
  • Contact Us
  • Print
Hitachi ID Systems, Inc.
  • Home
  • Solutions
    • IAM as a Service
    • Hitachi ID Identity Express™
    • Identity Express™ editions:
    • IAM for Employees and Contractors
    • IAM for Partners
    • Password Management
    • Privileged Access Management
  • Products
    • Hitachi ID Identity Manager
      • Solutions
        • Too Many Groups
        • Slow Onboarding
        • Unreliable Deactivation
        • Complex Access Requests
        • Obsolete Access Rights
        • Policy Violations
        • Costly Audits
        • No Accountability for Changes
        • Costly Security Administration
      • Features
        • Group Lifecycle Management
        • Automated Onboarding and Deactivation
        • Access Request Portal
        • Self-service Profile Updates
        • Delegated Access Administration
        • Robust Approvals Process
        • Access Reviews and Remediation
        • Segregation of Duties Policy Enforcement
        • Role-based Access Control
        • Risk Scores
        • History of Requests and Entitlements
        • Find Orphan and Dormant Accounts
        • Actionable Analytics
      • Screen Shots and Video
        • Videos
        • Concept Animations
        • Screen Shots
      • Benefits
        • Faster SLA to Grant Access
        • Complete and Reliable Deactivation
        • Link Access Rights to Business Context
        • Prevent Fraud and Minimize Risk
        • Compliance with Regulations
        • Empower Auditors to Answer Their Own Queries
      • Technology
        • Components and Policy Tables to Customize IAM Processes
        • Auto-discovery of Identities and Entitlements
        • Relationship-based Access Controls
        • Privacy Protection
        • Implementers Workflow
        • Intercept 'Access Denied' Dialogs
        • Compare User Entitlements
        • Automated and Self-service ID Mapping
        • Robust Workflow for Human Stake-holders
        • Role Mining and Entitlement Analytics
        • Reports, Dashboards and Analytics
      • Library
    • Hitachi ID Password Manager
      • Solutions
        • Too Many Passwords
        • Users Locked Out of Their PCs
        • High IT Support Call Volume
        • Weak Authentication into SaaS Apps
        • Uneven Support Call Volume
        • Weak Passwords
        • Off-hours IT Support
        • Too Many Privileged Users
      • Features
        • Password Synchronization
          • Transparent Password Synchronization
          • Web Browser Password Synchronization
        • Self-service Password Reset
        • Self-service, Anywhere
        • Managed User Enrollment
        • Unlock PC with Full Disk Encryption
        • Federated Access
        • Password Policy Enforcement
        • Password Expiration
        • Personal Password Vault
        • Assisted Password Reset
        • Telephone Access to Self-service
        • RSA SecurID Token Management
        • Smart Card PIN Reset
        • Download Contacts to Mobile Phone
        • Reports and Analytics
      • Screen Shots and Video
        • Videos
        • Concept Animations
        • Screen Shots
      • Benefits
        • Stronger Security
        • Lower IT Support Cost
        • Improved User Service
      • Technology
        • Target System Connectors
        • Other Integrations
          • Flexible Authentication
          • Send E-mails
          • Ticket Integration
          • Embed in Web Portals
          • Telephony (IVR)
        • Access to Self-service
        • Help Locked Out Users
        • Self-service for Off-site Users
        • Map User IDs
        • Scalability
        • Telephone Access
        • Language Support
        • Single Sign-on Without a Password Wallet
        • Runtime Requirements
      • Library
    • Hitachi ID Privileged Access Manager
      • Solutions
        • Static Passwords
        • Secure Credential Storage
        • Administrator Accountability
        • Reliable Authentication
        • Pre-authorized Access
        • One-time Access
        • Stop Disclosing Passwords
        • Forensic Audits
        • Scaling Up
        • Secure Windows Service Accounts
        • Secure Embedded Accounts
      • Features
        • Randomize Privileged Account Passwords
        • Secure Credential Vault
        • Policy to Control Access
        • Flexible Access Disclosure Mechanisms
          • Direct Connection
          • VDI Proxy
          • Web Proxy
          • Account Sets
          • Group Sets
          • Temporary SSH Trust
        • Session Recording
        • SSH Key Management
        • Secure and Monitor Vendor Access
        • Change Windows Service Account Passwords
        • Secure Application-to-Application Passwords
        • Reports, Dashboards and Analytics
      • Screen Shots and Video
        • Videos
        • Concept Animations
        • Screen Shots
      • Benefits
        • Risk Management
        • Workforce Flexibility
      • Technology
        • Network Architecture
        • Network Path to Managed Systems
        • Emergency Access
        • Included Connectors
        • Infrastructure Auto-discovery
        • Scalability
        • Granular Access Control
        • Privacy Protection
        • Authenticating Applications
        • Segregation of Duties
        • Flag Unusual Requests
      • Library
    • Hitachi ID Mobile Access
    • Suite 11.0
    • Download Evaluation
  • Services
    • Solution Delivery
    • Methodology
    • Education
      • Administrator Required Skills
      • Hitachi ID Identity Manager
      • Hitachi ID Password Manager
      • Hitachi ID Privileged Access Manager
    • Upgrades
    • AdMax Program
    • Hitachi ID Systems-Managed IAM
  • Security
    • IAM Controls
    • Password Security
    • Elevated Access
    • Regulatory Compliance
      • Regulatory Compliance Using IAM Automation
      • Specific Regulations
      • Compliance Architecture
      • Sarbanes-Oxley Act Compliance Using Hitachi ID Identity and Access Management Suite
      • PCI-DSS Compliance Using Hitachi ID Identity and Access Management Suite
      • FDA 21 CFR Part 11 Compliance Using Hitachi ID Identity and Access Management Suite
      • HIPAA Compliance Using Hitachi ID Identity and Access Management Suite
  • Technology
    • Network Architecture
    • Runtime Requirements
    • 100+ Included Connectors
      • LDAP
      • Windows and Active Directory
      • Lotus Notes / Domino Integration
      • Z/OS, OS390 and MVS
      • Databases
      • RSA SecurID
    • Mobile App and Access from BYOD
    • Web Services and APIs
    • Localization
    • 2FA for Everyone
  • Library
    • Documents
    • Savings Calculator
    • Independent Reviews
    • Certifications
    • IAM Concepts
    • IT Security Concepts
  • Support
    • Shipping Products
    • Support for Older Releases
    • Portal Login
  • Our Company
    • News & Events
      • Upcoming Events
      • Press Releases
      • Press Coverage
      • Archived Webinars
    • Customers
      • North America Customers
      • Europe Customers
      • South Pacific Customers
      • Customer Referral
      • Customer Portal
    • Partners
      • Technology Partners
      • Channel Partners
      • System Integrators and Consultants
      • Managed Service Providers
      • Partner Portal Login
      • New Partner Sign-up
    • Careers
      • Calgary, Canada
      • Montréal, Canada
      • Europe
      • USA
    • Contact Us
    • RSS & Blog
    • Case Studies
  •   »  
  • Library
  •   »  
  • IT Security Concepts

IT Security Concepts

Definitions of IT security terminology.


  • Access
  • Access Change Authorization Workflow
  • Access Channel
  • Access Control
  • Access Management
  • Access Management System
  • Access Logs
  • Account
  • Account Update
  • Accountability
  • Active Server Pages
  • Administrator
  • Agent
  • Alias
  • Application Level Firewall
  • Assisted Password Reset
  • Asymmetric Encryption
  • Audit Trail
  • Authentication
  • Authentication Factor
  • Authentication Management
  • Authentication Profile
  • Authentication Server
  • Authenticator
  • Authorization
  • Authorization Rule
  • Authorizer
  • Automated Provisioning
  • Automatic Retry
  • Availability
  • Biometric Authentication
  • Bottom-up Role Mining
  • Blocking Record
  • Breach of Confidentiality
  • Business Role
  • By-example Role Mining
  • Central User Administration
  • Centrally Managed PKI Key
  • Certificate
  • Certificate Authority
  • Change Authorization
  • Cipher
  • Ciphertext
  • Client-Side Secure Kiosk Account
  • Common Carrier
  • Common Gateway Interface
  • Complexity Requirements
  • Confidentiality
  • Connector
  • Content Filter
  • Cookies
  • Credentials
  • Credential Providers
  • Cryptographic Authentication
  • Cryptographic Certificate
  • Deactivation
  • Decryption
  • Delegated User Administration
  • Denial of Service
  • Directory
  • Directory Cleanup
  • Directory Migration
  • Directory Synchronization
  • Disabled Account
  • DNS
  • Encrypted Communcation
  • Encrypted Storage
  • Encryption
  • Encryption Key
  • Enterprise Single Sign-On (E-SSO)
  • Exception (as it relates to RBAC)
  • Exponential Back-Off
  • Fault Tolerance
  • File System
  • Firewall
  • Ftp
  • Graphical Identification and Authentication (GINA)
  • Global User ID
  • Group
  • Hardware Token
  • Hash
  • Help Desk Analyst
  • Host Security Scanner
  • Host System
  • HTTP
  • HTTPS
  • Identity Data
  • Identity and Access Management (IdM)
  • Identity and Access Management Server
  • Identity and Access Management Software
  • Identity and Access Management System
  • Identity Management and Access Governance
  • Infrastructure Role
  • Insider
  • Integrity
  • Intruder
  • Intruder Lockout
  • IP
  • IPX
  • IP Masquerading
  • IP Spoofing
  • Java
  • Java Script
  • Key Distribution
  • Key Management
  • LDAP
  • Legal Information
  • Local Agents
  • Login
  • Login Account
  • Login Credentials
  • Login Session
  • Logout
  • Loss of Integrity
  • Mail Relay
  • Target System
  • Message Digest
  • Meta Directory
  • Meta Role
  • Model Account
  • Nested Role
  • NetBEUI
  • NetWare
  • NetWare Bindery
  • NetWare NDS
  • Network Address Translation
  • Network File System
  • Network Security Scanner
  • Non-Repudiation
  • One-Time Password (OTP)
  • Operating System
  • Orphan Account
  • Outsider
  • Owner
  • Packet Level Firewall
  • Packet Sniffer
  • Password
  • Password Change
  • Password Expiry
  • Password Propagation
  • Password Reset
  • Password Synchronization
  • Penetration Test
  • Personal Information
  • Physically Distributed PKI Key
  • Plaintext
  • Platform
  • Plugin Architecture
  • Plugin Point
  • Plugin Program
  • Policy
  • Policy Based Access Control
  • PPP
  • Predicted Privilege
  • Predicted Resource
  • Prerequisite Rule
  • Pretty Good Privacy
  • Principals
  • Privacy Enhanced Mail
  • Private Key
  • Private Transmission
  • Privilege
  • Privilege Model
  • Provisioning
  • Public Key
  • Public Key Infrastructure (PKI)
  • Radius
  • Recipient
  • Remote Access Server
  • Remote Agents
  • Request Router
  • Requester
  • Resource Disposition
  • Resource Exclusion Rule (Separation of Duties Policies)
  • Resource Owner
  • Resource
  • Role
  • Role Based Access Control (RBAC)
  • Role Mining
  • Role Owner
  • Root
  • Router
  • Rule
  • Rules Based Access Control
  • SCP
  • Secure Kiosk Account (SKA)
  • Security
  • Security Administrator
  • Security Exploit
  • Security Policy
  • Security Risk
  • Security Scanner
  • Self Reset
  • Self-Service
  • Self-Service Password Reset
  • Session Hijacking
  • Signature
  • Single Sign-On
  • Site Blocking
  • Smart Card
  • SMTP
  • SNMP
  • Spam
  • Spam Filter
  • SPX
  • SSH
  • SSL
  • Standard User ID
  • Stream Cipher
  • Sub-Host
  • Supervisor
  • Symmetric Encryption
  • System Administrator
  • TACACS
  • Target System
  • TCP
  • Telnet
  • Template Account
  • Termination
  • Ticket
  • Token
  • Top-down Role Mining
  • Transparent Password Synchronization
  • Trust
  • Two-Factor Authentication
  • UDP
  • Unix
  • User
  • User Access
  • User Group
  • User ID
  • User ID Reconciliation
  • User Selection Rule
  • Virtual Private Network
  • Virus
  • Virus Scanner
  • Virus Wall
  • War Dialer
  • Web-Based Password Synchronization
  • Web Access Management System (WebAM)
  • Web Single Sign-On (WebSSO)
  • Windows NT
  • World Wide Web
  • WWW Proxy
  • X.400
  • X.500
  • X.509


Quick Links

Request software evaluation

Download free, full-featured, time-expired evaluation software.

Cost savings calculator

Find out how much Hitachi ID Suite can save your organization.

Please call me

Get more information about our solutions and services.
  • Privacy Policy
  • Terms of Use

© Hitachi ID Systems, Inc.