IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   SSO  >  

E-SSO

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Enterprise Single Sign-on
DEFINITION: Access control system designed to minimize the number of times that a user must type their ID and password to sign into multiple applications.
E-SSO Multimedia (View All Report Types)
51 - 75 of 639 Matches Previous Page  |  Next Page
Applications for 28 AWG Twisted Pair Cabling Systems
sponsored by Panduit
WEBCAST: In this webcast, Thomas Bond, Senior Product Manager, Panduit, explains space saving techniques for your telecommunications room and the key benefits of the smaller 28 AWG cabling.
Posted: 22 Sep 2017 | Premiered: Feb 16, 2016

Panduit

As a DevOps Engineer, What Should I know about Security Tools?
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.
Posted: 20 Sep 2017 | Premiered: 20 Sep 2017

CyberArk Software, Inc

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Lumension

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments

AppSense DataNow
sponsored by AppSense
VIDEOCAST: Learn how your organization can provide instant access to work documents from mobile devices. This videocast presents a solution that extends your IT infrastructure out into the mobile world in minutes.
Posted: 19 Jun 2012 | Premiered: Jun 19, 2012

AppSense

As Your Business Grows, How Can You Shrink Your Carbon Footprint?
sponsored by Dimension Data
WEBCAST: This informative blog post explores how you can transform your business model with the cloud in order to both reduce IT costs and lower your carbon footprint. Download now to uncover other technologies you can use to reduce your impact on the planet.
Posted: 20 Nov 2015 | Premiered: Nov 20, 2015

Dimension Data

Assessment Tool: Understanding the Economics of Cyberdefense
sponsored by Juniper Networks, Inc.
WEBCAST: How should you balance the four spend areas in cyberdefense? Calculate investment levels with RAND's interactive tool.
Posted: 08 Sep 2015 | Premiered: Sep 8, 2015

TOPICS:  IT Management
Juniper Networks, Inc.

Australia Department of Prime Minister & Cabinet on G20 Tech
sponsored by Dimension Data
VIDEO: In a world first, the 2014 G20 used cloud for secure networking and virtual desktop. Learn how a new benchmark was set.
Posted: 08 Jun 2015 | Premiered: 08 Jun 2015

TOPICS:  IT Management
Dimension Data

Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
WEBCAST: Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Watch this FREE 30-minute Webcast and learn how Robot/CONSOLE can solve the headaches of resource monitoring.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

Automating User Provisioning: A User’s Perspective
sponsored by Oracle Corporation
WEBCAST: Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.
Posted: 09 Mar 2011 | Premiered: Apr 12, 2011, 14:00 EDT (18:00 GMT)

Oracle Corporation

Avoid Gridlock With a Flexible Infrastructure
sponsored by IBM
VIDEO: Ensure your data center runs smoothly and supports the growth of your business with a software-defined storage solution.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

B2B Integration for Healthcare: Don't Worry. Be Ready.
sponsored by IBM
WEBCAST: Healthcare transformations are increasing B2B integration complexity. Prepare your organization with IBM architecture.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Balancing User Productivity and Security
sponsored by RES Software
VIDEO: Uncover a secure access system your workforce can use to ensure the safety of enterprise data. At the same time, you can ensure that workers aren't hampered by your security systems and can get their work done.
Posted: 17 Nov 2016 | Premiered: 17 Nov 2016

RES Software

Banking - Analytics Drive Banking Innovations, Better Customer Service
sponsored by Hewlett-Packard Enterprise
VIDEO: See how the use of real-time data is creating new opportunities for banking enterprises—and their customers.
Posted: 17 Oct 2016 | Premiered: 17 Oct 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL TRADESHOW: Access this resource to learn how to optimize operations, performance, analytics, automation and delivery of your IT services in today's complex on-premise, hybrid and cloud environments. You'll be able to select from a wide array of content in different media formats to help you make smarter decisions now and for your organization's future.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

IBM

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL ENVIRONMENT: Access this resource to learn how IBM can help you with the Operations, Performance, Analytics, Automation and Delivery of your IT services in today's complex on-prem, hybrid and cloud environments. You'll be access a wide array of content in different media format to help you make smarter decisions now and for your organization's future.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

IBM

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Best Practices for Archiving Lotus Domino Environments
sponsored by Symantec Corporation
WEBCAST: This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
Posted: 07 Mar 2008 | Premiered: Mar 19, 2008, 14:00 EDT (18:00 GMT)

Symantec Corporation

Best Practices for Securing SaaS with CASB
sponsored by McAfee, Inc.
VIDEO: Listen to Securosis and McAfee discuss the challenges in cloud security and the benefits of agile security solutions.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Branch, Cloud and Software Defined with Riverbend
sponsored by Hewlett-Packard Enterprise
VIDEO: David Groves explains how the app performance company is growing its services business in partnership with HPE.
Posted: 22 Dec 2016 | Premiered: 22 Dec 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Brian Madden and BlackBerry's Alan Panezic discuss BlackBerry Mobile Fusion, Balance, and PlayBook 2.0
sponsored by BlackBerry
VIDEO: Watch this 10 minute video to hear Brian Madden, blogger, and Alan Panezic, VP of Enterprise Product Management from BlackBerry, discuss the new offerings BlackBerry is giving to make sure employers and employees are happy with their mobile device capabilities.
Posted: 24 Feb 2012 | Premiered: 24 Feb 2012

BlackBerry
51 - 75 of 639 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement